Welcome, Guest: Register On Nairaland / LOGIN! / Trending / Recent / NewStats: 3,207,371 members, 7,998,764 topics. Date: Sunday, 10 November 2024 at 06:54 AM |
Nairaland Forum / Science/Technology / Webmasters / Simple Guidance For You In Authentication - Trivest Technologies (665 Views)
Ancla Technologies Launches A Url Shortener Service / Google Ad-sense Is Frustrating Me..........please Guidance / Get 135 Wordpress Premium Theme For Just N25,000 And Guidance On How To Install (2) (3) (4)
(1) (Reply)
Simple Guidance For You In Authentication - Trivest Technologies by Spazwik: 11:04am On Feb 27, 2019 |
Authentication is the process of giving access to authorized users and denying access to unauthorized users for a particular resource on a server. This might involve the use of a document, password or biometric details, the user needs to identify him or herself before they are given access. Authentication is a protocol under Logical Access Control Systems and the authentication controls can be embedded within operating systems, applications, add-on security packages, or database and telecommunication management systems. Types Of Authentication The most frequently used type of authentication are; Single Factor Authentication Two Factor Authentication Multi-Factor Authentication Strong Authentication Single Factor Authentication This is the process of authorizing a user with only one out of the three categories of credentials. It is the weakest form of authentication which is used by most systems. Two Factor Authentication This is the process of authorizing a user or group of users with two layers of security, could be a password and a token or a pin and a one time password. This provides a high level of security which is needed by financial institutions and e-commerce systems. Multi-Factor Authentication Multi-Factor authentication is an extra layer of security included in the two-layer security to enhance the security of a transaction. Strong Authentication This is the use of several categories of authentication factors to confirm the identity of a user during a transaction. Authentication Servers RADIUS (Remote Authentication Dial-In User Service) LDAP (Lightweight Directory Access Protocol) TACACS+ (Terminal Access Controller Access Control System) Windows (For stateful NTLM authentication) Authentication Protocols Kerberos Authentication Protocol NT LAN Manager (NTLM) authentication protocol Secure Sockets Layer/Transport Security Layer (SSL/TLS) Digest authentication Kerberos Authentication Protocol Kerberos version 5 is the default authentication protocol for windows server 2003, the Kerberos is derived from Greek mythology (three-headed dog) because of its three components which are The Identity of network users. A server on which clients request services. A computer which both clients and server trust. Kerberos does not transmit passwords during the authentication process. This is typically a Windows Server 2003 domain controller on which the Key Distribution Center service is running. The Kerberos Protocol is required when you need to; Accept a clients request for authentication. Verify the services the user is trying to request is valid. NT LAN Manager Authentication The NT Lan Manager Authentication Protocol is the main authentication type used to enable network authentication for versions of Windows earlier than Windows 2000 such as Windows NT 4. This protocol is used for authentication of all machines between Windows 2000 and Windows NT. Secure Socket Layer/ Transport Layer Security (SSL/TLS) Secure Socket Layer is a Windows 2003 server security protocol which utilizes public key technology to provide a secure channel for applications communication of a non-secure network such as the internet. The SSL works on the OSI Layer and provide encryption/decryption for the following protocols; HTTP LDAP IMAP The SSL protocol makes it possible to; Verify if the server a user is communicating is the actual server and not an intercept. Enables the server to verify the user’s identity. Ensures data confidentiality between the server and the user. Digest Authentication Digest Authentication is used to authenticate web applications running Internet Information Services. The Digest Access protocol employs challenge-response mechanisms for applications using HTTP or Simple Authentication Security Layers Communication (SASL). Trivestgroup is a Nigerian Security Company specialized in Authentication servers and protocols suitable for all organizations. Contact trivestgroup on +234-802-230-6494 or forward a mail to contact@trivestgroup.com for your security risk assessment today. Article Link : https://www.trivestgroup.com/simple-guidance-for-you-in-authentication/ |
(1) (Reply)
How Can I Host On Godaddy.com With Coupon Code / High DR(60-80) Dofollow Backlinks: 100 Backlinks at affordable price / Buying Cheap Youtbue Views
(Go Up)
Sections: politics (1) business autos (1) jobs (1) career education (1) romance computers phones travel sports fashion health religion celebs tv-movies music-radio literature webmasters programming techmarket Links: (1) (2) (3) (4) (5) (6) (7) (8) (9) (10) Nairaland - Copyright © 2005 - 2024 Oluwaseun Osewa. All rights reserved. See How To Advertise. 12 |