AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |
Back to Blog
![]() Authentication and Authorization are often used together.The authorization requirements for a site are typically defined in a website’s. For example, Boston University students are not authorized to view certain web pages dedicated to professors and administration. Authorization should be used whenever you want to control viewer access of certain pages.Other commercial websites such as require people to login before buying products so they know exactly who their purchasers are. Weblogin is Boston University’s primary method of authentication. Authentication should be used whenever you want to know exactly who is using or viewing your site.Encryption is also often used when the data returned by the server to the client should be protected, such as a financial statement or test results. Doing so ensures the person’s privacy during the communication. Encryption should be used whenever people are giving out personal information to register for something or buy a product.Here are a few examples of where encryption, authentication, and authorization are used by computers: A flight attendant must authorize a person so that person can then see the inside of the plane and use the resources the plane has to fly from one place to the next. Authorization is used when a person shows his or her boarding pass to the flight attendant so he or she can board the specific plane he or she is supposed to be flying on.Airports need to authenticate that the person is who he or she says she is and has purchased a ticket, before giving him or her a boarding pass. Authentication is used when a traveler shows his or her ticket and driver’s license at the airport so he or she can check his or her bags and receive a boarding pass.The company encrypts the customer’s data so that it will be safer from interception in transit. Encryption is used to protect a person’s credit card and personal information when it is sent over the Internet to the airline. ![]() Upon finding the perfect flight at an ideal price, a person goes to buy the ticket. Encryption is used when a person buys their ticket online at one of the many sites that advertises cheap ticket.One example in which authorization, authentication, and encryption are all used is booking and taking an airplane flight. Using authentication, authorization, and encryptionĪuthentication, authorization, and encryption are used in every day life. By encrypting the data exchanged between the client and server information like social security numbers, credit card numbers, and home addresses can be sent over the Internet with less risk of being intercepted during transit.All data in SSH sessions is encrypted between the client and the server when communicating at the shell.All data in SSL transactions is encrypted between the client (browser) and the server (web server) before the data is transferred between the two.The SSL drives the secure part of “http s://” sites used in e-commerce sites (like E-Bay and .) The Secure Shell (SSH) and Socket Layer (SSL) protocols are usually used in encryption processes.Encryption involves the process of transforming data so that it is unreadable by anyone who does not have a decryption key.Most of the web pages on the Internet require no authentication or authorization. In some cases, there is no authorization any user may be use a resource or access a file simply by asking for it.The type of authentication required for authorization may vary passwords may be required in some cases but not in others.Authorization is usually coupled with authentication so that the server has some concept of who the client is that is requesting access.Authorization is a process by which a server determines if the client has permission to use a resource or access a file.Authentication merely identifies and verifies who the person or system is. Authentication does not determine what tasks the individual can do or what files the individual can see.Authentication by a client usually involves the server giving a certificate to the client in which a trusted third party such as Verisign or Thawte states that the server belongs to the entity (such as a bank) that the client expects it to. ![]() Other ways to authenticate can be through cards, retina scans, voice recognition, and fingerprints. Usually, authentication by a server entails the use of a user name and password.In authentication, the user or computer has to prove its identity to the server or client. ![]()
0 Comments
Read More
Leave a Reply. |