User-Based Security

From the perspective of traditional user-based security, the authentication question is, Who is the identity attempting to do the action? An identity is typically a user or group name. Credentials are what the users present to prove who they are. Credentials are evidence presented for verification of identity. A credential might be your password, a smart card, or a biometric device. The users' credentials must be verified with some security authority. An example of this is verification of the user's password against his or her login name based on a database of user names and encrypted passwords. Systems that allow unverified access are said to allow anonymous access. In security lingo, an identity that can be authenticated ...

Get Application Development Using Visual Basic® and .NET now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.