• Home
  • Services
    • Managed Detection and Response
    • Security Assessment
    • Phishing Assessment
    • Vulnerability Management
    • CISO as a Service
    • Penetration Testing
    • Outside-in-Security
    • Inside-Out-Security
    • Security Audit
    • Static Code Analysis
  • Insights
  • Contact Us
Menu
  • Home
  • Services
    • Managed Detection and Response
    • Security Assessment
    • Phishing Assessment
    • Vulnerability Management
    • CISO as a Service
    • Penetration Testing
    • Outside-in-Security
    • Inside-Out-Security
    • Security Audit
    • Static Code Analysis
  • Insights
  • Contact Us
Phone-alt Linkedin

Authentication

In Identity Management, the letters AAA stands for Authentication, Authorisation and Accounting.

  • Authentication proves the person’s identity, software application, or technology asset accessing a resource.
  • Authorisation defines the permission the resource holds to access a particular resource.
  • Accounting keeps track of the who, what, when, where etc. the audit trail.

 

As an essential member of the AAA family, Authentication verifies the identity of a system, device, or individual. A typical example of Authentication is username and password while logging into a workstation. Assuming the password is kept a secret, by successfully authenticating using a username and password, a user is letting the workstation know who they are, and that is them accessing the system.

 

Some of the standard authentication types –

One-factor Authentication – The most common and least secure authentication type that uses a single credential is shown below.

 

Two-factor Authentication – Using two different credentials, a 2FA is more secure than 1FA is shown below.

 

Three-factor Authentication – An emerging secure way of Authentication using three different credentials is shown below.

 

As seen from the figures above, authentication factors can be categorised as follows:

Something you know (Password, Passphrase, Pin)

Something you have (Token, One-time pin)

Something you are (Fingerprint, retinal scan)

Somewhere you are (Geographic location, VLAN, office building)

Something you do (Behaviour, keystrokes, mouse movement)

Recent blog posts

Common Vulnerabilities and Exposures – October 2022

Read More »

Hacks – October 2022

Read More »

Protecting your data – The CIA Triad – Part One: Confidentiality

Read More »

Need help with this?

Enter your details below and one of our team will get in touch

Other Similar Articles

Why is penetration testing important for your business

Read More »

Hacks – October 2022

Read More »

Protect your Microsoft O365 tenant

Read More »

Common Vulnerabilities & Exposures

Read More »
View all our blog articles
Linkedin
  • Insights
  • Contact Us
Menu
  • Insights
  • Contact Us

Our Office

Level 2, 157 Walker Street, North Sydney, NSW 2060

Call Us

(02) 9136 6066

Email Address

info@brace168.com