Cannabis Ruderalis

Content deleted Content added
m ce
Tag: 2017 wikitext editor
Daisy Bacon ST (talk | contribs)
m →‎External links: Server guide
 
(One intermediate revision by one other user not shown)
Line 15: Line 15:
{{Reflist}}
{{Reflist}}


== External links ==

* [https://www.ibm.com/docs/en/host-on-demand/14.0?topic=SSS9FA_14.0.0/com.ibm.hod.doc/help/serverauth.htm "Server authentication"]. ''www.ibm.com''. Retrieved 2023-09-05.
*[https://blog.servermania.com/choosing-a-small-business-server Business server]
{{DEFAULTSORT:Authentication Server}}
{{DEFAULTSORT:Authentication Server}}
[[Category:Computer network security]]
[[Category:Computer network security]]

Latest revision as of 10:47, 7 January 2024

An authentication server provides a network service that applications use to authenticate the credentials,[1] usually account names and passwords, of their users. When a client submits a valid set of credentials, it receives a cryptographic ticket that it can subsequently use to access various services.

Authentication is used as the basis for authorization, which is the determination whether a privilege may be granted to a particular user or process, privacy, which keeps information from becoming known to non-participants, and non-repudiation, which is the inability to deny having done something that was authorized to be done based on the authentication.

Major authentication algorithms include passwords, Kerberos, and public key encryption.

See also[edit]

References[edit]

  1. ^ Hong, S.-M.; Lee, S.; Park, Y.; Cho, Y.; Yoon, H. (2000-11-01). "On the construction of a powerful distributed authentication server without additional key management". Computer Communications. 23 (17): 1638–1644. doi:10.1016/S0140-3664(00)00250-4.

External links[edit]


Leave a Reply