O'Reilly logo

Security+ Training Guide by Todd King

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Authentication Methods

Recognize, explain, and differentiate authentication methods.

Authentication is the process used to identify an agent requesting the use of resources. An authentication request can be presented by any of the following agents:

  • Human

  • Computer system

  • Network device, such as a router or switch

  • Software program

Authentication can take place locally on a single computer system or be passed over a network to a centralized authentication system. In each of these situations, the purpose of authentication is to associate a set of credentials (supplied by the agent) with an electronic ID. The electronic ID can then be granted (or denied) access to resources, group membership, and rights on the network and its computer systems.

Authentication ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required