Understanding Authentication

You use authentication every day of your life. When you are at a seminar or training event and the speaker says he is an expert on the topic of his speech, you use authentication mechanisms to verify this information. You listen to the information he delivers and use it to determine if he is truly an expert. You practice authentication in casual interactions too. For example, suppose someone walked up to you and said, "Hi, my name is Susan and I am tall." You would look at her and compare her height with a height you consider to be tall and authenticate whether she is truly tall or not. If she is not tall, by your standards, she will lose credibility with you.

Remember the word credentials? Consider other important ...

Get SQL Server® 2008 Administration: Real World Skills for MCITP Certification and Beyond now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.