data-driven-docs

Selft training repo


Project maintained by ggranados Hosted on GitHub Pages — Theme by mattgraham

Authentication (AuthN) and Authorization (AuthZ)


Table of Contents


Overview

AuthN and AuthZ refer to two fundamental aspects of controlling access to resources and ensuring the confidentiality and integrity of sensitive information within a system.

By combining strong authentication and precise authorization mechanisms, IT systems can enforce security and prevent unauthorized access to sensitive data and resources, thereby protecting against data breaches and unauthorized activities.

Back to top

Authentication (AuthN):

AuthN, short for “Authentication,” is the process of verifying the identity of a user, system, or device attempting to access a particular resource or service. The primary goal of authentication is to ensure that only legitimate and authorized entities are granted access while keeping unauthorized users out.

Authentication methods typically involve the presentation of credentials by the user, which are then compared against pre-registered or pre-issued data to validate the identity.

Common authentication factors include:

To enhance security, many systems now employ Multi-Factor Authentication (MFA) where users must provide two or more of these factors for an extra layer of protection.

Back to top

Authentication Methods (AuthN):

Back to top

Authorization (AuthZ):

Authorization is the process of determining what actions, resources, or services an authenticated user or entity is permitted to access. It involves granting appropriate privileges and permissions to users based on their role, identity, or attributes.

Authorization is typically governed by access control policies that define the rules and restrictions for different user groups or roles. These policies may include Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC), and other access control models.

The authorization mechanism ensures that users are only allowed to perform actions that are within their defined scope and permissions.

Back to top

Authorization Methods (AuthZ):

Back to top


Ref.


Get Started | Web Services and API Design