Ch2 - 2.02 - Understanding Authentication and Authorization Flashcards
List Popular Methods Used for Identification and
Authentication Purposes
- Username (& Password)
- Smartcard (& PIN. E.g: Credit/Debit Card)
- Token (With Username & Password»_space; MFA)
- Biometrics (E.g: Fingerprint, Retina)
Identification and Authentication
Identification happens before authentication and is the process of having users identify themselves to the system.
The most popular method companies use to
identify individual users is to give each user a unique username. The users type their username into the system in order to identify themselves.
After the user inputs the identifying information (the username), the user inputs the password for that account for purposes of authentication. The information is then sent to an authentication system that is responsible for verifying that the username and password are valid.
If the username and password are correct, the user is granted access to the system, but if the information is incorrect, an error is displayed and access is denied.
Authorization
Once the user has been authenticated, they are given access to different resources; this is known as authorization.