Understanding Authentication
You use authentication every day of your life. When you are at a seminar or training event and the speaker says he is an expert on the topic of his speech, you use authentication mechanisms to verify this information. You listen to the information he delivers and use it to determine if he is truly an expert. You practice authentication in casual interactions too. For example, suppose someone walked up to you and said, "Hi, my name is Susan and I am tall." You would look at her and compare her height with a height you consider to be tall and authenticate whether she is truly tall or not. If she is not tall, by your standards, she will lose credibility with you.
Remember the word credentials? Consider other important ...
Get SQL Server® 2008 Administration: Real World Skills for MCITP Certification and Beyond now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.