answersLogoWhite

0

Authentication comes in two major levels: strong and standard. A "personal identifier" (name) and something you know (password) are the standard level. If a higher level of security than passwords is needed, people can be required to "have something" as well as "know something". The have-something category includes biometrics (e.g., fingerprints), tokens, smartcards, and a private or public key infrastructure (PKI) key.

Solutions for authentication usually vary in a large organization; senior Accountants, for example, need to access sensitive financial data, but a salesperson should not have access to the same data. Individuals accessing highly sensitive data need strong authentication, while standard authentication works for other employees. Technologies supporting flexible authentication and authorization are readily available.

Authorization also needs to be established for the different parties with whom you do business. To return to the home analogy, just because you have invited someone into your house does not mean that the person has the right to examine your tax returns or read your love letters. Authorization provides the same controls for digital environments. You may be collaborating with company A on a business deal but competing with them on a different contract. Obviously, you would not want all your information to be available to them. In this case, only people authorized according to your business rules should be able to access the relevant information.

In addition, access controls can limit resources down to individual records in a database and work with authentication. Within large databases, groups or individuals can be granted access to different information using tools that offer fine-grained access control. Different levels of authentication may be demanded on the basis of what information is accessed. Senior employees may not need to pass stringent security to see the company's annual report, but they may later be asked to pass higher security to see unreleased financial information. These kinds of flexible authorization are necessary for e-commerce.

User Avatar

Wiki User

13y ago

What else can I help you with?

Related Questions

What authentication protocol separates the authentication authorization and auditing processes?

XTACACS


How many types of authorization and authentication provided by ASP.net?

Authentication !) form based Authentication 2) Windows " " 3) Passport "


What service is responsible for authentication and logon?

There are various services that ensure authentication during logon. Examples of these are Java Authentication and Authorization Service and Kerberos.


Authorization proves that an individual is who he says he is?

False. the correct answer is Authentication.


What are the 3 A's of network security?

authentication authorization & accounting


Which technology provides centralized remote user authentication authorization and accounting?

RADIUS


What are the primary functions of active directory?

To provide authentication and authorization services for hardware and software resources on the network like computer,users,printers groups etc. Authentication would be verifying the user's identity while authorization is the process of granting the user access to only the resources they are permitted to useTo provide authentication and authorization services for hardware and software resources on the network. Authentication would be verifying the user's identity while authorization is the process of granting the user access to only the resources they are permitted to use.


How do you manage user authentication and authorization in a web app?

In a web app, user authentication is done by checking login details like a username and pass.. Once logged in, the system creates a token or session to remember the user. Authorization is about giving users the right permissions and ensuring they can only access parts of the app they're allowed to. Both authentication and authorization are checked on each request to keep the app secure.


What are the three most important elements to secure in any information technology setting?

The 3 fundamental elements of an effective access control solution for information systems are Authentication, Identification, and Authorization.


All what are ensured by IA except a. Availability b. Authentication c. Integrity d. Authorization?

b


What are the three fundamental element of an effective access control solution for information systems?

Identification, Authentication, and Authorization


What is Computer Authentication?

Authentication is a process in which the credentials provided are compared to those on file in a database of authorized users' information on a local operating system or within an authentication server. If the credentials match, the process is completed and the user is granted authorization for access.