User Tools

Site Tools


glossary:p:authentication
  • Bookmark "AAA" at del.icio.us
  • Bookmark "AAA" at Digg
  • Bookmark "AAA" at Furl
  • Bookmark "AAA" at Reddit
  • Bookmark "AAA" at Ask
  • Bookmark "AAA" at Google
  • Bookmark "AAA" at Netscape
  • Bookmark "AAA" at StumbleUpon
  • Bookmark "AAA" at Technorati
  • Bookmark "AAA" at Live Bookmarks
  • Bookmark "AAA" at Yahoo! Myweb
  • Bookmark "AAA" at Facebook
  • Bookmark "AAA" at Newsvine
  • Bookmark "AAA" at Yahoo! Bookmarks
  • Bookmark "AAA" at Twitter
  • Bookmark "AAA" at myAOL
  • Bookmark "AAA" at Slashdot
  • Bookmark "AAA" at Mister Wong

AAA

AAA stands for a security concept which includes 3 main tasks. Each A stands for one main task.

Authentication

Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. In private and public computer networks (including the Internet), authentication is commonly done through the use of logon passwords. Knowledge of the password is assumed to guarantee that the user is authentic. Each user registers initially (or is registered by someone else), using an assigned or self-declared password. On each subsequent use, the user must know and use the previously declared password. The weakness in this system for transactions that are significant (such as the exchange of money) is that passwords can often be stolen, accidentally revealed, or forgotten. For this reason, Internet business and many other transactions require a more stringent authentication process. The use of digital certificates issued and verified by a Certificate Authority (CA) as part of a public key infrastructure is considered likely to become the standard way to perform authentication on the Internet. 1)

Authorization

Logically, authentication precedes authorization (although they may often seem to be combined), whereas authorization is the process of giving someone permission to do or have something. In multi-user computer systems, a system administrator defines for the system which users are allowed access to the system and what privileges of use (such as access to which file directories, hours of access, amount of allocated storage space, and so forth). Assuming that someone has logged in to a computer operating system or application, the system or application may want to identify what resources the user can be given during this session. Thus, authorization is sometimes seen as both the preliminary setting up of permissions by a system administrator and the actual checking of the permission values that have been set up when a user is getting access.2)

Accounting

Last but not least, AA is completed by a third “A”, which stands for 'Accounting'.

The final plank in the AAA framework is accounting, which measures the resources a user consumes during access. This can include the amount of system time or the amount of data a user has sent and/or received during a session. Accounting is carried out by logging of session statistics and usage information and is used for authorization control, billing, trend analysis, resource utilization, and capacity planning activities.

Authentication, authorization, and accounting services are often provided by a dedicated AAA server, a program that performs these functions. A current standard by which network access servers interface with the AAA server is the Remote Authentication Dial-In User Service (RADIUS). 3)

  • Bookmark "AAA" at del.icio.us
  • Bookmark "AAA" at Digg
  • Bookmark "AAA" at Furl
  • Bookmark "AAA" at Reddit
  • Bookmark "AAA" at Ask
  • Bookmark "AAA" at Google
  • Bookmark "AAA" at Netscape
  • Bookmark "AAA" at StumbleUpon
  • Bookmark "AAA" at Technorati
  • Bookmark "AAA" at Live Bookmarks
  • Bookmark "AAA" at Yahoo! Myweb
  • Bookmark "AAA" at Facebook
  • Bookmark "AAA" at Newsvine
  • Bookmark "AAA" at Yahoo! Bookmarks
  • Bookmark "AAA" at Twitter
  • Bookmark "AAA" at myAOL
  • Bookmark "AAA" at Slashdot
  • Bookmark "AAA" at Mister Wong
glossary/p/authentication.txt · Last modified: 2011/05/12 07:29 (external edit)