Authentication
The process of verifying the identity of a user, device, or system before granting access to resources or services. It ensures that the entity requesting access is who they claim to be.
Characteristics
– User Credentials: Involves the use of usernames, passwords, biometric data, or tokens.
– Multi-Factor Authentication (MFA): Enhances security by requiring two or more verification methods.
– Session Management: After successful authentication, a session is created to maintain the user’s logged-in state.
– Secure Protocols: Often utilizes secure communication protocols like HTTPS to protect credentials during transmission.
Examples
– Username and Password: The most common form of authentication where users enter a unique identifier and a secret password.
– Biometric Authentication: Uses fingerprint scanning or facial recognition to verify identity.
– OAuth: A protocol that allows third-party applications to access user data without sharing passwords, commonly used in social media logins.
– Two-Factor Authentication (2FA): Requires a second form of verification, such as a code sent to a mobile device, in addition to the password.


