Authentication

Authentication Authentication in computer systems uses application protocols to verify that the identity which is requesting access to a computing system is actually who they say they are. Common authentication protocols are OpenID, NTLM, Kerberos, PAP and CHAP. There is a long list of authentication protocols available, each one being applicable to different systems and ... Read more

Authorization

Authorization Authorization works right after authentication, in order to grant access and permissions to an identity requesting access to IT resources. The most common authorization protocol is OAuth, now in OAuth 2.0 version. At least one and a resource owner are involved in the authorization process. Authorization works by having an authorization server assign access ... Read more

MFA

MFA Multi-factor authentication (MFA) is the process of authenticating an identity into a computing system, application or service by providing at least two of the following authentication factors: The following list provides the most common MFA factor implemented today by security companies:

Strong Authentication

Strong Authentication (SA) Strong authentication assumes the usage of Multi-factor authentication (MFA) as a baseline, but goes beyond that with other authentication means. Strong authentication employs National Institute for Standards and Technology (NIST) assurance level-2 or assurance level-3. More details about strong authentication can be found at: https://www.yubico.com/resources/glossary/strong-authentication/.