Authentication Schemes

No matter which access control scheme you use (DAC, MAC, and so forth), the basic two-step process to log into the network is always required. Every authorized user has (or should have) their own user account. To use the IT system, the user must first login. The two-step login process is for you as a claimant to claim an identity (identification) and then prove that you are responsible for that identity (authentication). There are at least three important aspects to this two-step process that require investigation:

  • Number and type of factors
  • Client, server, or mutual authentication
  • Mechanism of authentication protection

Authentication Factors

The number and type of factors reflect the strength of the authentication process. ...

Get CompTIA® Security+™: Study Guide, Fifth Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.