Posts

Showing posts from March, 2024

Remote user Authentication principles

Image
  User Authentication User Authentication: User Authentication as we are all know that" Uses Authentication" means verifying whether he/ she is a correct / Authorized user) this is to be identified before communicating with him.  THIS processes is called " User Authentication" .   Remote user Authentication principles : (1) It is the Fundamental security building block. (2) It is the Basic of access control && User accountability. (3) It is the process of verifying an identity claimed by / For a system entity. Note : Generally, System may Require many kinds of Credentials like passwords &, we are keeping these passwords as secret only these passwords are known By authorized Systems . mainly there are a steps that are present in the process, of Authentication. They are: 1) Identification - Specify identifier 2) Verification - Bind entity / person and identification. (1) Identification Step: Presenting an identifier to the Security System. There are 4 gene...