Assignment 1: Difference Between Authorization And Authentication

845 Words4 Pages

Authentication

Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. In private and public computer networks (including the Internet), authentication is commonly done through the use of logon passwords.Knowledge of such is assumed to guarantee that the user is authentic. Thus, when you are asked to "authenticate" to a system, it usually means that you enter your username and/or password for that system.
For example, human resources staff is normally authorized to access employee records and this policy is usually formalized as access control rules in a computer system. During operation, the system uses the access control rules to decide whether access requests from (authenticated) …show more content…

The rights and preferences granted for the authorized account depend on the user’s permissions, which are also stored locally or on the authentication server. The settings defined for all these environment variables are set by an administrator.

Difference between Authentication and Authorization

Authentication

• Authentication is used by a server when the server needs to know exactly who is accessing their information or site.
• Authentication is used by a client when the client needs to know that the server is system it claims to be.
• In authentication, the user or computer has to prove its identity to the server or client.
• Usually, authentication by a server entails the use of a user name and password. Other ways to authenticate can be through cards, retina scans, voice recognition, and fingerprints.
• Authentication by a client usually involves the server giving a certificate to the client in which a trusted third party such as Verisign or Thawte states that the server belongs to the entity (such as a bank) that the client expects it to.
• Authentication does not determine what tasks the individual can do or what files the individual can see. Authentication merely identifies and verifies who the person or system …show more content…

If we do not want them to inherit permissions, select this folder only in Apply onto when we set up special permissions for the parent folder. In cases where we want to prevent only certain files or subfolders from inheriting permissions, right-click the file or subfolder, click Properties, click the Security tab, click Advanced, and then clear the Inherit from parent the permission entries that apply to child objects. Include these with entries explicitly defined here.
If the check boxes appear shaded, the file or folder has inherited permissions from the parent folder. There are three ways to make changes to inherited permissions:

• Make the changes to the parent folder, and then the file or folder will inherit these permissions.
• Select the opposite permission (Allow or Deny) to override the inherited permission.
• Clear the Inherit from parent the permission entries that apply to child objects. Include these with entries explicitly defined here. We can then make changes to the permissions or remove the user or group from the permissions list. However, the file or folder will no longer inherit permissions from the parent

More about Assignment 1: Difference Between Authorization And Authentication

Open Document