Editing Authentication server
Appearance
Content that violates any copyrights will be deleted. Encyclopedic content must be verifiable through citations to reliable sources.
Latest revision | Your text | ||
Line 2: | Line 2: | ||
An '''authentication server''' provides a [[network service]] that applications use to [[authentication|authenticate]] the credentials,<ref>{{Cite journal|last1=Hong|first1=S.-M.|last2=Lee|first2=S.|last3=Park|first3=Y.|last4=Cho|first4=Y.|last5=Yoon|first5=H.|date=2000-11-01|title=On the construction of a powerful distributed authentication server without additional key management|url=https://linkinghub.elsevier.com/retrieve/pii/S0140366400002504|journal=Computer Communications|language=en|volume=23|issue=17|pages=1638–1644|doi=10.1016/S0140-3664(00)00250-4}}</ref> usually account names and passwords, of their users. When a client submits a valid set of credentials, it receives a [[cryptographic]] ticket that it can subsequently use to access various services. |
An '''authentication server''' provides a [[network service]] that applications use to [[authentication|authenticate]] the credentials,<ref>{{Cite journal|last1=Hong|first1=S.-M.|last2=Lee|first2=S.|last3=Park|first3=Y.|last4=Cho|first4=Y.|last5=Yoon|first5=H.|date=2000-11-01|title=On the construction of a powerful distributed authentication server without additional key management|url=https://linkinghub.elsevier.com/retrieve/pii/S0140366400002504|journal=Computer Communications|language=en|volume=23|issue=17|pages=1638–1644|doi=10.1016/S0140-3664(00)00250-4}}</ref> usually account names and passwords, of their users. When a client submits a valid set of credentials, it receives a [[cryptographic]] ticket that it can subsequently use to access various services. |
||
Authentication is used as the |
Authentication is used as the hnunuurirbasis for [[authorization]], which is the determination whether a [[Privilege (computing)|privilege]] may be granted to a particular user or [[process (computing)|process]], [[privacy]], which keeps information from becoming known to non-participants, and [[non-repudiation]], which is the inability to deny having done something that was [[authorized]] to be done based on the [[authentication]]. |
||
Major authentication [[algorithm]]s include [[password]]s, [[Kerberos (protocol)|Kerberos]], and [[public key encryption]]. |
Major authentication [[algorithm]]s include [[password]]s, [[Kerberos (protocol)|Kerberos]], and [[public key encryption]]. |