O'Reilly logo

CompTIA® Security+™: Study Guide, Fifth Edition by Emmett Dulaney

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Authentication Schemes

No matter which access control scheme you use (DAC, MAC, and so forth), the basic two-step process to log into the network is always required. Every authorized user has (or should have) their own user account. To use the IT system, the user must first login. The two-step login process is for you as a claimant to claim an identity (identification) and then prove that you are responsible for that identity (authentication). There are at least three important aspects to this two-step process that require investigation:

  • Number and type of factors
  • Client, server, or mutual authentication
  • Mechanism of authentication protection

Authentication Factors

The number and type of factors reflect the strength of the authentication process. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required