SlideShare a Scribd company logo
THE PROCESS OF
AUTHENTICATION
‫ب‬‫ر‬‫املد‬ ‫اف‬‫ر‬‫إش‬:‫م‬.‫ابرهيم‬‫العديني‬
‫ب‬‫ر‬‫املتد‬:‫عبدالرحمن‬‫املحمادي‬
INTRODUCTION
An authentication protocol is a type of computer communications protocol or
cryptographic protocol specifically designed for transfer of authentication data
between two entities. It allows the receiving entity to authenticate the connecting
entity.
WHAT IS THE PROCESS OF
AUTHENTICATION
security mechanism used to determine users & client privileges or access
levels related to system resources, including computer programs, files,
services, data and application features. Authorization is normally preceded
by authentication for user identity verification. System administrators are
typically assigned permission all user resources.
AUTHENTICATION TYPES
 Kerberos authentication protocol
 NT LAN Manager (NTLM) authentication protocol
 Secure Sockets Layer/Transport Security Layer (SSL/TLS)
 Digest authentication
 Smart cards
 Virtual Private Networking (VPN) and Remote Access Services (RAS)
AUTHENTICATION SERVICE FEATURES
 Account Locking
 Authentication Chaining
 Fully Qualified Domain Name Mapping
 Persistent Cookies
 Session Upgrade
 JAAS Shared State
 Security
STEP TO ACCESS
 Permissions
 Police
 Rights
AUTHENTICATION PROTOCOLS
 PAP - Password Authentication Protocol
 CHAP - Challenge-handshake authentication protocol
 EAP - Extensible Authentication Protocol
 AAA architecture protocols
SUMMARY
The final step in the Authentication Process is to make a determination. The
determination must be made by a qualified individual capable of interpreting
and weighing all of the available evidence as produced by the various
authentication steps.
REFERENCES
 https://www.techopedia.com/definition/10237/authorization
 http://www.tech-faq.com/authentication-types.html
 https://docs.oracle.com/cd/E19316-01/820-3740/adrbs/index.html
 https://www.youtube.com/watch?v=gkxYw1THdHk
 https://en.wikipedia.org/wiki/Authentication_protocol

More Related Content

PPTX
AAA Implementation
PPTX
The process of authentication
PDF
The Three Musketeers (Authentication, Authorization, Accounting)
PPT
Implementing Cisco AAA
PDF
AAA Protocol
PPTX
Security
PPTX
Federated identity, Project Cloud QTR meeting @ Disney/ABC
PDF
10. grid security
AAA Implementation
The process of authentication
The Three Musketeers (Authentication, Authorization, Accounting)
Implementing Cisco AAA
AAA Protocol
Security
Federated identity, Project Cloud QTR meeting @ Disney/ABC
10. grid security

What's hot (13)

PPTX
Authentication, authorization, accounting(aaa) slides
PDF
Radius vs. Tacacs+
ODP
AAA in a nutshell
PPT
RADIUS
PPTX
The last picks
PDF
Cisco acs configuration guide
PPTX
(2) OAuth 2.0 Client Registration
DOCX
An Efficient Authentication Scheme Based on Semi-Trusted Authority in VANETs
PPT
Mutual Authentication For Wireless Communication
PPTX
Network and internet security
PDF
Https interception proxies
PDF
BoKS ServerControl version 7.0
PPTX
Juniper SA Overview
Authentication, authorization, accounting(aaa) slides
Radius vs. Tacacs+
AAA in a nutshell
RADIUS
The last picks
Cisco acs configuration guide
(2) OAuth 2.0 Client Registration
An Efficient Authentication Scheme Based on Semi-Trusted Authority in VANETs
Mutual Authentication For Wireless Communication
Network and internet security
Https interception proxies
BoKS ServerControl version 7.0
Juniper SA Overview
Ad

Recently uploaded (20)

PPTX
newyork.pptxirantrafgshenepalchinachinane
PPTX
Power Point - Lesson 3_2.pptx grad school presentation
PPTX
Internet___Basics___Styled_ presentation
PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
PPTX
presentation_pfe-universite-molay-seltan.pptx
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
DOCX
Unit-3 cyber security network security of internet system
PPTX
t_and_OpenAI_Combined_two_pressentations
PPT
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
PDF
Introduction to the IoT system, how the IoT system works
PDF
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
DOC
Rose毕业证学历认证,利物浦约翰摩尔斯大学毕业证国外本科毕业证
PDF
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
PPT
250152213-Excitation-SystemWERRT (1).ppt
PPTX
E -tech empowerment technologies PowerPoint
PPTX
Digital Literacy And Online Safety on internet
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
newyork.pptxirantrafgshenepalchinachinane
Power Point - Lesson 3_2.pptx grad school presentation
Internet___Basics___Styled_ presentation
SASE Traffic Flow - ZTNA Connector-1.pdf
presentation_pfe-universite-molay-seltan.pptx
Design_with_Watersergyerge45hrbgre4top (1).ppt
Unit-3 cyber security network security of internet system
t_and_OpenAI_Combined_two_pressentations
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
Introduction to the IoT system, how the IoT system works
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
Rose毕业证学历认证,利物浦约翰摩尔斯大学毕业证国外本科毕业证
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
250152213-Excitation-SystemWERRT (1).ppt
E -tech empowerment technologies PowerPoint
Digital Literacy And Online Safety on internet
Module 1 - Cyber Law and Ethics 101.pptx
The New Creative Director: How AI Tools for Social Media Content Creation Are...
Unit-1 introduction to cyber security discuss about how to secure a system
Ad

The process of authentication

  • 1. THE PROCESS OF AUTHENTICATION ‫ب‬‫ر‬‫املد‬ ‫اف‬‫ر‬‫إش‬:‫م‬.‫ابرهيم‬‫العديني‬ ‫ب‬‫ر‬‫املتد‬:‫عبدالرحمن‬‫املحمادي‬
  • 2. INTRODUCTION An authentication protocol is a type of computer communications protocol or cryptographic protocol specifically designed for transfer of authentication data between two entities. It allows the receiving entity to authenticate the connecting entity.
  • 3. WHAT IS THE PROCESS OF AUTHENTICATION security mechanism used to determine users & client privileges or access levels related to system resources, including computer programs, files, services, data and application features. Authorization is normally preceded by authentication for user identity verification. System administrators are typically assigned permission all user resources.
  • 4. AUTHENTICATION TYPES  Kerberos authentication protocol  NT LAN Manager (NTLM) authentication protocol  Secure Sockets Layer/Transport Security Layer (SSL/TLS)  Digest authentication  Smart cards  Virtual Private Networking (VPN) and Remote Access Services (RAS)
  • 5. AUTHENTICATION SERVICE FEATURES  Account Locking  Authentication Chaining  Fully Qualified Domain Name Mapping  Persistent Cookies  Session Upgrade  JAAS Shared State  Security
  • 6. STEP TO ACCESS  Permissions  Police  Rights
  • 7. AUTHENTICATION PROTOCOLS  PAP - Password Authentication Protocol  CHAP - Challenge-handshake authentication protocol  EAP - Extensible Authentication Protocol  AAA architecture protocols
  • 8. SUMMARY The final step in the Authentication Process is to make a determination. The determination must be made by a qualified individual capable of interpreting and weighing all of the available evidence as produced by the various authentication steps.
  • 9. REFERENCES  https://www.techopedia.com/definition/10237/authorization  http://www.tech-faq.com/authentication-types.html  https://docs.oracle.com/cd/E19316-01/820-3740/adrbs/index.html  https://www.youtube.com/watch?v=gkxYw1THdHk  https://en.wikipedia.org/wiki/Authentication_protocol