Authentication server
This article needs additional citations for verification. (December 2009) (Learn how and when to remove this template message) |
An authentication server provides a network service that applications use to authenticate the credentials,[1] usually account names and passwords, of their users. When a client submits a valid set of credentials, it receives a cryptographic ticket that it can subsequently use to access various services.
Authentication is used as the basis for authorization, which is the determination whether a privilege may be granted to a particular user or process, privacy, which keeps information from becoming known to non-participants, and non-repudiation, which is the inability to deny having done something that was authorized to be done based on the authentication.
Major authentication algorithms include passwords, Kerberos, and public key encryption.
See also
References
- ↑ Hong, S.-M.; Lee, S.; Park, Y.; Cho, Y.; Yoon, H. (2000-11-01). "On the construction of a powerful distributed authentication server without additional key management" (in en). Computer Communications 23 (17): 1638–1644. doi:10.1016/S0140-3664(00)00250-4. https://linkinghub.elsevier.com/retrieve/pii/S0140366400002504.
External links
- "Server authentication". www.ibm.com. Retrieved 2023-09-05.
- Business server
Original source: https://en.wikipedia.org/wiki/Authentication server.
Read more |