O'Reilly logo

Healthcare Information Technology Exam Guide for CompTIA Healthcare IT Technician and HIT Pro Certifications by Brian Gugerty, Kathleen McCormick

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Authentication

Authentication in this context consists of the electronic mechanisms used to prove that someone or something is who they say they are. (This is independent of the identity proofing step that proves that an identity is being issued correctly.) There are two types of authentication: authentication used prior to issuing an identity and authentication for the use of that identity.

Essentially, the process of user authentication proves that a human is the one associated with a user identity (or user account). This might be the process used in a user interface to authenticate the “human” behind the keyboard. This also includes the process that is used to move that user authentication to other software that relies on it. An extreme example ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required