TheDragonFire (talk | contribs) m Revert link spam added by 161.0.99.243. |
TheDragonFire (talk | contribs) m ce Tag: 2017 wikitext editor |
||
Line 2: | Line 2: | ||
An '''authentication server''' provides a [[network service]] that applications use to [[authentication|authenticate]] the credentials,<ref>{{Cite journal|last1=Hong|first1=S.-M.|last2=Lee|first2=S.|last3=Park|first3=Y.|last4=Cho|first4=Y.|last5=Yoon|first5=H.|date=2000-11-01|title=On the construction of a powerful distributed authentication server without additional key management|url=https://linkinghub.elsevier.com/retrieve/pii/S0140366400002504|journal=Computer Communications|language=en|volume=23|issue=17|pages=1638–1644|doi=10.1016/S0140-3664(00)00250-4}}</ref> usually account names and passwords, of their users. When a client submits a valid set of credentials, it receives a [[cryptographic]] ticket that it can subsequently use to access various services. |
An '''authentication server''' provides a [[network service]] that applications use to [[authentication|authenticate]] the credentials,<ref>{{Cite journal|last1=Hong|first1=S.-M.|last2=Lee|first2=S.|last3=Park|first3=Y.|last4=Cho|first4=Y.|last5=Yoon|first5=H.|date=2000-11-01|title=On the construction of a powerful distributed authentication server without additional key management|url=https://linkinghub.elsevier.com/retrieve/pii/S0140366400002504|journal=Computer Communications|language=en|volume=23|issue=17|pages=1638–1644|doi=10.1016/S0140-3664(00)00250-4}}</ref> usually account names and passwords, of their users. When a client submits a valid set of credentials, it receives a [[cryptographic]] ticket that it can subsequently use to access various services. |
||
Authentication is used as the |
Authentication is used as the basis for [[authorization]], which is the determination whether a [[Privilege (computing)|privilege]] may be granted to a particular user or [[process (computing)|process]], [[privacy]], which keeps information from becoming known to non-participants, and [[non-repudiation]], which is the inability to deny having done something that was [[authorized]] to be done based on the [[authentication]]. |
||
Major authentication [[algorithm]]s include [[password]]s, [[Kerberos (protocol)|Kerberos]], and [[public key encryption]]. |
Major authentication [[algorithm]]s include [[password]]s, [[Kerberos (protocol)|Kerberos]], and [[public key encryption]]. |
Revision as of 20:20, 8 July 2021
An authentication server provides a network service that applications use to authenticate the credentials,[1] usually account names and passwords, of their users. When a client submits a valid set of credentials, it receives a cryptographic ticket that it can subsequently use to access various services.
Authentication is used as the basis for authorization, which is the determination whether a privilege may be granted to a particular user or process, privacy, which keeps information from becoming known to non-participants, and non-repudiation, which is the inability to deny having done something that was authorized to be done based on the authentication.
Major authentication algorithms include passwords, Kerberos, and public key encryption.
See also
References
- ^ Hong, S.-M.; Lee, S.; Park, Y.; Cho, Y.; Yoon, H. (2000-11-01). "On the construction of a powerful distributed authentication server without additional key management". Computer Communications. 23 (17): 1638–1644. doi:10.1016/S0140-3664(00)00250-4.