An authentication server provides a network service that applications use to authenticate the credentials,[1] usually account names and passwords, of their users. When a client submits a valid set of credentials, it receives a cryptographic ticket that it can subsequently use to access various services.
Authentication is used as the basis for authorization, which is the determination whether a privilege may be granted to a particular user or process, privacy, which keeps information from becoming known to non-participants, and non-repudiation, which is the inability to deny having done something that was authorized to be done based on the authentication.
Major authentication algorithms include passwords, Kerberos, and public key encryption.
YouTube Encyclopedic
-
1/3Views:151 0481 34783 167
-
MicroNugget: How Does Kerberos Work?
-
04 Overview of Azure MFA Server Features
-
Linux Tutorial for Beginners - 15 - SSH Key Authentication
Transcription
See also
References
- ^ Hong, S.-M.; Lee, S.; Park, Y.; Cho, Y.; Yoon, H. (2000-11-01). "On the construction of a powerful distributed authentication server without additional key management". Computer Communications. 23 (17): 1638–1644. doi:10.1016/S0140-3664(00)00250-4.
External links
- "Server authentication". www.ibm.com. Retrieved 2023-09-05.
- Business server