Online Learning Platform

Information SEcurity > Access Control in Security > Differences Between Authentication and Authorization

 

Authentication

Authorization

In the authentication process, the identity of users are checked for providing the access to the system.

While in authorization process, a the person's or user's authorities are checked for accessing the resources.

In the authentication process, users or persons are verified.

While in this process, users or persons are validated.

It is done before the authorization process.

While this process is done after the authentication process.

It needs usually the user's login details.

While it needs the user's privilege or security levels.

Authentication determines whether the person is user or not.

While it determines What permission does the user have?

 

   

Generally, transmit information through an ID Token.

Generally, transmit information through an Access Token.

The OpenID Connect (OIDC) protocol is an authentication protocol that is generally in charge of user authentication process. 

The OAuth 2.0 protocol governs the overall system of user authorization process.

Popular Authentication Techniques-

•       Password-Based Authentication

•       Passwordless Authentication

•       2FA/MFA (Two-Factor Authentication / Multi-Factor Authentication)

•       Single sign-on (SSO)

•       Social authentication

Popular  Authorization Techniques-

•       Role-Based Access Controls (RBAC)

•       JSON web token (JWT) Authorization

•       SAML Authorization

•       OpenID Authorization

Authorization examples

  • When a user logs in to their email account, they can only see their emails. They’re not authorized to view anyone else’s messages.
  • In a healthcare records system, a patient’s data can only be viewed by providers to whom the patient has explicitly given their consent.
  • A user creates a document in a shared file system. They set the access permissions to “read only” so that other users can view the document but cannot edit it.
  • A laptop’s operating system prevents an unknown program from changing system settings.
Prev
Working principal of Access Control
Next
Types of Authentications
Feedback
ABOUT

Statlearner


Statlearner STUDY

Statlearner