O'Reilly logo

Inside Java™ 2 Platform Security: Architecture, API Design, and Implementation, Second Edition by Mary Dageforde, Gary Ellison, Li Gong

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

1.6. Authentication

Another basic security issue is authentication. Authentication is the process of confirming the identity of an entity (a user, a machine, or a machine operating on behalf of a user). Authentication first became an issue when time-sharing systems began to be deployed and the system needed to know the identity of a user logging in to the system. This knowledge is critical for enforcing access control policies, as most of the security models mentioned previously are based on granting access to certain users and not to others.

The importance of authentication increased when networked computer systems started to surface. The network often is shared or public, so it is crucial to authenticate, or know the identity of, the user ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required