Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What is "Principal", and what is meant by "Principal
authentication"?

Answer Posted / rithi

Linda Gricius (March, 1998):

Principal authentication is the process of proving your
identity to the security enforcing components of the system
so that they can grant access to information and services
based on who you are. This applies to both human users of
the system as well as to applications.

A user or application that can authenticate itself is known
as a principal. A principal has a name that uniquely
identifies it.

For human users, the process of authenticating to the system
is informally known as "logging on". In a typical system, an
application is provided to collect information proving the
user's identity. This application is often referred to as
the "user sponsor". In order to successfully authenticate to
the system, it is important that a principal can provide
some proof that it is who it claims to be. Proof of
authentication is usually achieved by demonstrating
knowledge or possession of a "secret" known only to the
"real principal", such as a password or cryptographic key.

It is important that a successfully authenticated principal
can be given some unforgeable evidence that it has recently
authenticated, in order to prevent the principal from having
to continually re-authenticate itself to different parts of
the system. The unforgeable evidence that is returned to
authenticated principals is known as the principal's
credentials.

Is This Answer Correct ?    0 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Explain are the different threading models that can be used within corba servers?

839


Compare CORBA security with security of other distributed object computing frameworks such as Java RMI or DCOM?

1877


Explain does corba supports asynchronous communication?

818


What is corba good for?

887


Can corba application have call back?

1000


What about CSI with SSL?

2422


Explain can corba application be tuned for better performance?

918


Does corba support distributed reference counting architectures?

808


Does corba supports asynchronous communication?

828


Can corba application be multi-threaded?

840


What are the reason to avoid the development of multi-threaded corba application?

909


What would be the most suitable ORB products when buliding a small lab for evaluating, testing and implementing security functions in a CORBA system?

2643


Explain high-level technical overview of corba?

832


Explain can corba allow servers to cause client side events or notifications?

837


What are the shortcomings of CORBA Security service?

2060