|
Authentication |
Authorization |
|
In the authentication process, the identity of users are checked for providing the access to the system. |
While in authorization process, a the person's or user's authorities are checked for accessing the resources. |
|
In the authentication process, users or persons are verified. |
While in this process, users or persons are validated. |
|
It is done before the authorization process. |
While this process is done after the authentication process. |
|
It needs usually the user's login details. |
While it needs the user's privilege or security levels. |
|
Authentication determines whether the person is user or not. |
While it determines What permission does the user have? |
|
Generally, transmit information through an ID Token. |
Generally, transmit information through an Access Token. |
|
The OpenID Connect (OIDC) protocol is an authentication protocol that is generally in charge of user authentication process. |
The OAuth 2.0 protocol governs the overall system of user authorization process. |
|
Popular Authentication Techniques- • Password-Based Authentication • Passwordless Authentication • 2FA/MFA (Two-Factor Authentication / Multi-Factor Authentication) • Single sign-on (SSO) • Social authentication |
Popular Authorization Techniques- • Role-Based Access Controls (RBAC) • JSON web token (JWT) Authorization • SAML Authorization • OpenID Authorization |
Authorization examples
Statlearner
Statlearner