answersLogoWhite

0


Best Answer

Authentication is based upon either:

  1. Something you know (such as a PIN).
  2. Something you have (such as an ID card).
  3. Something you are (such as a fingerprint, retina scan or DNA sample).

Preferably, authentication will combine two or more of the three.

User Avatar

Wiki User

11y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What is authentication based upon?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What is the portrays authentication based on something the user has?

An ID card portrays authentication based upon something the user has.


Does your fingerprint portray authentication based upon something the user is?

Yes. Any biometric reading, such as a fingerprint, retina scan or DNA sample portrays authentication based upon something the user is.


Does a fingerprint portray authentication based upon something known?

Not always. Authentication is based upon one or more of the following:Something the user knows (such as a PIN).Something the user has (such as an ID card).Something the user is (such as a fingerprint).


Does a PIN portray authentication based upon something known?

Yes.


Is authentication based on something a person is?

Not always. Authentication is based upon one or more of the following:Something the user knows (such as a PIN).Something the user has (such as an ID card).Something the user is (such as a fingerprint).


What requires port-based authentication?

RADIUS requires port-based authentication.


What is IP based authentication?

user and organizations can be authenticated upon their IP-address without having to enter username and password


Does radius require port-based authentication?

Yes, RADIUS requires port-based authentication.


Whart are the different web authentication mechanism?

The most common form of authentication is the password based authentication


How many types of authorization and authentication provided by ASP.net?

Authentication !) form based Authentication 2) Windows " " 3) Passport "


Does kerberos require port based authentication?

No


What type of authentication uses cards to gain access to buildings?

Identity based authentication or Role based authentication using magnetic card stripes can be used, or some other difficult to forge encoding, to gain access to buildings.