December 2021
Beginner
550 pages
20h 48m
English
So far in this chapter, you have learned about methods to define authorization rules and identify users. The next step is authentication. In this part of access control, users validate, or prove, the identity they claimed during identification. Authentication answers the question, are subjects who they claim to be? Because anyone can claim to be any identity, authentication verifies that the subject requesting access is really the claimed identity (authentic) and the same subject who has been granted access. Without authentication, you could never really know if subjects are who they say claim to be.
Following are the seven types of authentication:
Knowledge—Something you (the ...