O'Reilly logo

Application Development Using Visual Basic® and .NET by Dana L. Wyatt, Peter Thorsteinson, Robert J. Oberg

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

User-Based Security

From the perspective of traditional user-based security, the authentication question is, Who is the identity attempting to do the action? An identity is typically a user or group name. Credentials are what the users present to prove who they are. Credentials are evidence presented for verification of identity. A credential might be your password, a smart card, or a biometric device. The users' credentials must be verified with some security authority. An example of this is verification of the user's password against his or her login name based on a database of user names and encrypted passwords. Systems that allow unverified access are said to allow anonymous access. In security lingo, an identity that can be authenticated ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required