In this article, we have taken two very important topics of the cyber world namely
authentication and authorization. We shall also discuss the difference between
the two terms which have a direct link to our security on the World Wide Web
and other networks.
Concept of Authentication
"Authentication involves the act of the confirmation of the truth regarding all
the attributes of some entity or datum under the question".
The authentication
process is also linked up with the confirmation of the identity regarding the
following aspects:
- Confirmation of a person’s or software system’s or
program’s identity.
- Tracing of the origins of some artifacts.
- Ensuring that what the labelling and packaging claims to
be is what is that is actually in the product.
There
are three types of authentication methods which we have discussed below:
- The first type: It involves accepting of identity proof
given by some credible person who can provide evidence of the identity or
the originator and the object under assessment in question.
- The second type: It involves a comparison between the
attributes of the object itself and what is known about the objects of
same origin. But authentication of this type is quite vulnerable to
forgery and calls for expert knowledge
- The third type: It involves authentication on the basis
of the external affirmations like documentation.
Three factors need to be verified in authentication are:
- Owner ship factors
- Knowledge factors
- Inherence factors
Concept of Authorization
- The
process of authorization involves the act of the specification of the access
rights to the resources.
- These are the resources that are involved with the
computer security or information security in general.
- In particular these
resources are used to access control to the security system and other desired
information.
- To say it simply, authorization is the process of providing a
definition for the access policy.
- While the system is in operation, it makes
use of the access control rules for making decisions regarding the rejection or
approval of the access requests from the authenticated users or consumers.
- Resources
can be anything like:
- Individual files
- Items data
- Computer devices
- Computer programs
- Functionality of the computer applications and so on.
- Consumers
may be either computer users or computer programs or other devices on the
system.
- The access control process that is performed during the authorization
involves two main phases as mentioned below:
- Phase 1: This phase is known as the policy definition
phase and involves authorization of the access.
- Phase 2: This phase is known as the policy enforcement
phase and involves acceptation or rejection of the access requests.
Differences between Authentication and Authorization
- Verification of your identity: It means verifying who you are is called authentication whereas the verification of what you are authorized to do is called authorization. This is the simplest difference between the two similar sounding processes. Both of these processes are carried whenever some connection attempt is made and whether the attempt has to be allowed or rejected is decided based up on these two factors only.
- The basic goal of the authentication process is to
verify whether you are who you claim to be or not? On the other hand the
goal of the authorization is to set the access scope of the user who has
been authenticated in the previous process.
No comments:
Post a Comment