Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What is the difference between authentication and
authorization
?

Answer Posted / rahul

An authentication system is how you identify yourself to
the computer. The goal behind an authentication system is
to verify that the user is actually who they say they are.

There are many ways of authenticating a user. Any
combination of the following are good examples.


Password based authentication
Requires the user to know some predetermined quantity
(their password).

Advantages: Easy to impliemnt, requires no special
equipemnt.

Disadvantages: Easy to forget password. User can tell
another user their password. Password can be written down.
Password can be reused.

Device based authentication
Requires the user to posses some item such as a key, mag
strip, card, s/key device, etc.

Advantages: Difficult to copy. Cannot forget password. If
used with a PIN is near useless if stolen.

Disadvantages: Must have device to use service so the user
might forget it at home. Easy target for theft. Still
doesn't actually actively identify the user.

Biometric Authentication
My voice is my passport. Verify me. This is from the movie
sneakers and demonstrates one type of biometric
authentication device. It identifies some physical
charactistic of the user that cannot be seperated from
their body.

Authorization
Once the system knows who the user is through
authentication, authorization is how the system decides
what the user can do.

A good example of this is using group permissions or the
difference between a normal user and the superuser on a
unix system.

Is This Answer Correct ?    5 Yes 10 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Explain how does assembly versioning in .net prevent dll hell?

1074


Explain the differences between marshal by value and marshal by reference?

1038


Are you aware of containment and Aggregation ?

3191


Explain marshalling and its types in .net remoting

939


Elaborate the term WebService and how it differ from Remoting?

954


What are the different types of channels used by .net remoting?

948


What are static assemblies?

996


How do you directly call a native function exported from a DLL?

7584


Can you pass SOAP messages through remoting?

1046


Define a process?

1023


What is objref object in remoting?

1164


Explain the hierarchial description of remoting?

938


What are the information required to configure remote objects?

957


What do you mean by windows authentication?

1062


What are the remotable objects in .net remoting?

960