CHAPTER

11   Authentication

Overview

•   11.1 Entity Identification: Phase 1 of Authentication

•   11.2 Identity Certification: Phase 2 of Authentication

•   11.3 Identity Resolution: Phase 3 of Authentication

•   11.4 Identity Assertion and Identity Proving: Phases 4 and 5 of Authentication

•   11.5 Identity Decertification: Phase 6 of Authentication

•   11.6 Machine-to-Machine Authentication Chaining

Learning Objectives

•   Explain the authentication problem and how cryptography is applied to solve it.

•   Discuss the phases of authentication and how they relate to one another.

•   List and describe the three types of unique identifying schemas.

•   Compare and contrast strengths and weaknesses of identity schemas.

•   Explain the value of ...

Get Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.