|
Authentication is one of the stages of granting access to IT resources. Performed after successful identification and preceding authorization, authentication is the process of verifying the authenticity of the identifier presented by the user. In other words, during the authentication process, the user and the authenticator presented by him are checked.
The unique information provided by the user to the system during authentication is called an authentication factor. Depending on the means used to verify the user's authenticity, authentication factors are divided into several categories:
user knowledge - data that only the user should know (password, card or token PIN code, etc.).
User-owned device - a device with unique parameters that only the user has ( token, smart card , one-time password generator). Using additional devices makes the authentication process more secure than password access, since it is much more difficult for an intruder to gain access to the device than to "hack" the password.
user biometric parameters - characteristics that are a physical feature of the user: fingerprint, palm vein pattern, voice, retina. Biometric authentication does not require the user to remember passwords or have an authentication device, and also eliminates the possibility of transmitting authentication data to another person.
Authentication using each of these factors has its advantages and disadvantages. However, the disadvantages of individual factors are easily eliminated by using a combination of several authentication parameters. In this case, we speak of multi-factor authentication .
Obviously, the more factors used for authentication, the more reliable it is. In practice, the most common is the use of two factors (the so-called two-factor authentication).
Depending on the type of authentication data, various authentication technologies are distinguished: password authentication, biometric authentication, authentication by key carrier, etc.
Share
More useful materials from virtual phone number service experts and the latest news from Indid Company in our Telegram channel
Join
Read more on the topic
16.09.2024
Events
Identity Conf 2024 — the first conference in Russia on the topic of Identity security
Registration for Identity Conf 2024, which will take place on October 31 in the Cyberdom space in Moscow, is now open. The conference will be held for the first time and will become an annual event and a center of attraction for expertise in the field of […]
Read more
14.05.2024
Indeed Privileged Access Manager
Indeed Privileged Access Manager (Indeed PAM) Update: Version 2.10
Indeed is pleased to announce version 2.10 of Indeed Privileged Access Manager (Indeed PAM). Indeed PAM now supports OpenLDAP and ALD PRO directory services in addition to Active Directory and FreeIPA. In […]
Read more
23.12.2022
Glossary
TWO-FACTOR (TWO-STEP) AUTHENTICATION
Two-factor (or two-step) authentication appeared in 1984. The verification of the user's identity using this technology is performed on the basis of two types of identification data. This can be information known to the user […]
Read more
09.12.2022
Glossary
BIOMETRIC USER AUTHENTICATION
Biometric authentication is the authentication of a user based on their unique biometric characteristics. These characteristics include fingerprints, palm veins, retinal structure, facial features, voice, keyboard strokes […]
Read more
07.12.2022
Glossary
SINGLE SIGN-ON TECHNOLOGY
Single Sign-On (SSO) technology enables the use of a single ID to access all authorized IT resources and systems, and enables the solution of strict and end-to-end user authentication issues. SSO solutions centrally.
|
|