An authentication protocol allows one entity to verify the identity of another connecting entity. It is a type of computer communications protocol designed specifically for transferring authentication data. Authentication determines a user's privileges and access levels to system resources and normally precedes authorization. Common authentication types include Kerberos, NTLM, SSL/TLS, digest authentication, smart cards, VPNs and RAS. The final step in authentication is for a qualified individual to interpret all available evidence and make a determination.
2. INTRODUCTION
An authentication protocol is a type of computer communications protocol or
cryptographic protocol specifically designed for transfer of authentication data
between two entities. It allows the receiving entity to authenticate the connecting
entity.
3. WHAT IS THE PROCESS OF
AUTHENTICATION
security mechanism used to determine users & client privileges or access
levels related to system resources, including computer programs, files,
services, data and application features. Authorization is normally preceded
by authentication for user identity verification. System administrators are
typically assigned permission all user resources.
8. SUMMARY
The final step in the Authentication Process is to make a determination. The
determination must be made by a qualified individual capable of interpreting
and weighing all of the available evidence as produced by the various
authentication steps.