Cannabis Ruderalis

Content deleted Content added
m Revert link spam added by 161.0.99.243.
m ce
Tag: 2017 wikitext editor
Line 2: Line 2:
An '''authentication server''' provides a [[network service]] that applications use to [[authentication|authenticate]] the credentials,<ref>{{Cite journal|last1=Hong|first1=S.-M.|last2=Lee|first2=S.|last3=Park|first3=Y.|last4=Cho|first4=Y.|last5=Yoon|first5=H.|date=2000-11-01|title=On the construction of a powerful distributed authentication server without additional key management|url=https://linkinghub.elsevier.com/retrieve/pii/S0140366400002504|journal=Computer Communications|language=en|volume=23|issue=17|pages=1638–1644|doi=10.1016/S0140-3664(00)00250-4}}</ref> usually account names and passwords, of their users. When a client submits a valid set of credentials, it receives a [[cryptographic]] ticket that it can subsequently use to access various services.
An '''authentication server''' provides a [[network service]] that applications use to [[authentication|authenticate]] the credentials,<ref>{{Cite journal|last1=Hong|first1=S.-M.|last2=Lee|first2=S.|last3=Park|first3=Y.|last4=Cho|first4=Y.|last5=Yoon|first5=H.|date=2000-11-01|title=On the construction of a powerful distributed authentication server without additional key management|url=https://linkinghub.elsevier.com/retrieve/pii/S0140366400002504|journal=Computer Communications|language=en|volume=23|issue=17|pages=1638–1644|doi=10.1016/S0140-3664(00)00250-4}}</ref> usually account names and passwords, of their users. When a client submits a valid set of credentials, it receives a [[cryptographic]] ticket that it can subsequently use to access various services.


Authentication is used as the hnunuurirbasis for [[authorization]], which is the determination whether a [[Privilege (computing)|privilege]] may be granted to a particular user or [[process (computing)|process]], [[privacy]], which keeps information from becoming known to non-participants, and [[non-repudiation]], which is the inability to deny having done something that was [[authorized]] to be done based on the [[authentication]].
Authentication is used as the basis for [[authorization]], which is the determination whether a [[Privilege (computing)|privilege]] may be granted to a particular user or [[process (computing)|process]], [[privacy]], which keeps information from becoming known to non-participants, and [[non-repudiation]], which is the inability to deny having done something that was [[authorized]] to be done based on the [[authentication]].


Major authentication [[algorithm]]s include [[password]]s, [[Kerberos (protocol)|Kerberos]], and [[public key encryption]].
Major authentication [[algorithm]]s include [[password]]s, [[Kerberos (protocol)|Kerberos]], and [[public key encryption]].

Revision as of 20:20, 8 July 2021

An authentication server provides a network service that applications use to authenticate the credentials,[1] usually account names and passwords, of their users. When a client submits a valid set of credentials, it receives a cryptographic ticket that it can subsequently use to access various services.

Authentication is used as the basis for authorization, which is the determination whether a privilege may be granted to a particular user or process, privacy, which keeps information from becoming known to non-participants, and non-repudiation, which is the inability to deny having done something that was authorized to be done based on the authentication.

Major authentication algorithms include passwords, Kerberos, and public key encryption.

See also

References

  1. ^ Hong, S.-M.; Lee, S.; Park, Y.; Cho, Y.; Yoon, H. (2000-11-01). "On the construction of a powerful distributed authentication server without additional key management". Computer Communications. 23 (17): 1638–1644. doi:10.1016/S0140-3664(00)00250-4.


Leave a Reply