Authentication (information security): Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Howard C. Berkowitz
(New page: {{subpages}})
 
imported>Howard C. Berkowitz
No edit summary
Line 1: Line 1:
{{subpages}}
{{subpages}}
In [[information security]], the processes of [[identification, authentication and credentialing]] are closely linked, '''authentication''' being the technologies and procedures used to confirm one's identification to a secure information system. You can think of it as a safeguard against [[identity theft]].
One of the basic ways to think about authentication is that it confirms your purported identity with:
*Something you '''know''' (e.g., a [[password]])
*Something you '''have''' (e.g., a [[key (lock)]] or [[security token]])
*Something you '''are''' (e.g., a [[biometrics|biometric attribute]], or perhaps a confirmed location
These are all '''factors''' in authentication, along with your claimed identity. '''Two-factor authentication''', at its most basic, is the combination of user ID and password.

Revision as of 10:39, 6 May 2010

This article is developing and not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
This editable Main Article is under development and subject to a disclaimer.

In information security, the processes of identification, authentication and credentialing are closely linked, authentication being the technologies and procedures used to confirm one's identification to a secure information system. You can think of it as a safeguard against identity theft.

One of the basic ways to think about authentication is that it confirms your purported identity with:

These are all factors in authentication, along with your claimed identity. Two-factor authentication, at its most basic, is the combination of user ID and password.