Identity authentication
In recent days, Saigon has begun to have the early season rains. It cause the lock of my house's gate to rust and become difficult to open. After addressing this by applying oil to lubricate the lock, I suddenly thought about the number of authentication mechanisms used in an information technology system.
Therefore, I have summarized the authentication mechanisms based on my knowledge and experience for the purpose of refreshing my understanding and for future reference.
Please correct me if anything is wrong!!!
What is authentication and why do we need it?
Authentication is the process of verifying the identity of an individual, device, or entity seeking access to a system, application, or resource. It is essential for information security and access control, ensuring that only authorized individuals or entities gain access to systems, applications, or data.
This protection helps guard against unauthorized access, data breaches, and misuse of resources, thereby upholding the confidentiality, integrity, and availability of sensitive information and systems.
Authentication types
Authentication categories
Knowledge-based authentication
Possession-based authentication
Biometric authentication
Proximity-based authentication
Others
Single-factor authentication
Is a method used to verify an individual's identity using only one type of credential or verification factor.
Pros:
Cons:
Multi-factor authentication (MFA)
Is a multi-steps login that requires user to enter more information than just a password. Eg: 2FA
Pros:
Cons:
Adaptive authentication
Is a method that assesses the risk associated with a specific access attempt and adjusts the level of authentication required based on that risk. It considers various factors such as user behavior, location, time of access, and the sensitivity of the resources being accessed.
Pros:
Cons:
Biometric authentication
Use unique biological characteristics, such as fingerprints, facial features, iris patterns, or voice recognition, to verify an individual's identity.
Pros:
Cons:
Use cases:
Token-based authentication
Is a method where a unique token, such as a physical or digital key, is used to grant access to a system or application. These tokens can be in the form of physical smart cards, key fobs, or digital tokens generated by authentication apps.
Pros:
Cons:
Use cases:
Certificate-based authentication
Involves the use of digital certificates to verify the identity of users, devices, or services seeking access to a system or network. These certificates are issued by a trusted authority and are used to establish secure connections and authenticate digital identities.
Pros:
Cons:
Use cases:
Personal Identification Number (PIN code)
Is a numeric password (4-6 digits) used to authenticate the identity of a user
Common used in conjunction with other authentication factors, such as physical cards
Pros:
Cons:
Username / password
Pros:
Cons:
Basic authentication
Is a simple authentication scheme built into the HTTP protocol.
Pros:
领英推荐
Cons:
Security question based authentication
Involves users selecting or setting up a series of questions and providing answers during the account creation process.
Pros:
Cons:
Use cases:
QR code scanning
Pros:
Cons:
Use cases:
One Time Password (OTP)
Is a unique code or password that is only valid for a single login session or transaction.
Generally used as a second factor in MFA.
OTP can be sent via:
Pros:
Cons:
Radio frequency identification (RFID)
Is a technology that uses radio waves to identify and track objects.
Pros:
Cons:
Use cases:
Near field communication (NFC)
Is a short-range wireless communication technology that allows devices to communicate when they are in close proximity, typically within a few centimeters of each other.
Pros:
Cons:
Use cases:
Fingerprint reader
Use a person's unique fingerprint patterns to verify their identity.
Pros:
Cons:
Use cases:
Face recognization
Use an individual's facial features, such as the geometry of the face, to verify their identity.
Pros:
Cons:
Use cases:
Bluetooth Low Energy (BLE)
Is a wireless communication technology designed for short-range communication between devices.
Pros:
Cons:
Use cases:
Single Sign On (SSO)
Pros:
Cons:
Use cases:
Credit to