{"id":904,"date":"2015-11-26T17:15:17","date_gmt":"2015-11-26T14:15:17","guid":{"rendered":"https:\/\/www.protectimus.com\/blog\/?p=904"},"modified":"2020-04-24T06:39:49","modified_gmt":"2020-04-24T03:39:49","slug":"identification-authentication-authorization","status":"publish","type":"post","link":"https:\/\/www.protectimus.com\/blog\/identification-authentication-authorization\/","title":{"rendered":"Identification, authentication, and authorization &#8211; what&#8217;s the difference"},"content":{"rendered":"<p>Identification, authentication, and authorization. We all face these three concepts every day, but not everyone knows the difference. Since these terms are essential in data protection, they deserve to be explained better.<\/p>\n<p>To begin, let\u2019s take an example from everyday life. It will help you to understand the difference between authentication and identification in general.<\/p>\n<p>A new employee comes to work for the first time. At the entrance, he introduces himself to a security guard and says that he is a new manager. Thus, he <strong>identifies<\/strong> himself &#8211; tells who he is.<\/p>\n<p>The security guard does not believe the words he says. He demands to provide evidence that this person is a new manager and has the right to enter the office. To solve the problem, the employee has to show his pass with the photo. And the security guard should compare it with his list of registered employees. The employee confirms his authenticity \u2013 this is <strong>authentication<\/strong>.<\/p>\n<p>Finally, a forbidden door opens, and the guard lets the employee in. Once the employee receives the permission to enter the office the <strong>authorization<\/strong> happens.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4880\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/11\/identificatio-authentication-authorization-process.png\" alt=\"Identification, authentication, and authorization \" width=\"600\" height=\"423\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/11\/identificatio-authentication-authorization-process.png 876w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/11\/identificatio-authentication-authorization-process-300x211.png 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/11\/identificatio-authentication-authorization-process-768x541.png 768w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/11\/identificatio-authentication-authorization-process-610x430.png 610w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>In the virtual world, everything is almost the same as in the real. Only the names of the &#8220;characters&#8221; are changing. The security guard is a server that controls the access to the website. And the manager who came to work &#8211; a user who wants to log in.<\/p>\n<p>It should be added that the security guards will repeat the procedure every day. Even when all the security guards know the manager by his look and name. They just do their job, like the server does.<\/p>\n<p>All three concepts &#8211; identification, authentication, and authorization &#8211; are the stages of one process that controls users\u2019 access to their accounts.<\/p>\n<p>To perform any action on a website, the user must &#8220;introduce himself&#8221; to the system. User\u2019s identification means presenting grounds for the entry to the site or service. As a rule, your username or email address provided during registration serve as identificators. If the server finds in its database the data coinciding with that entered by the user, the user&#8217;s identification is successful.<\/p>\n<p>Login is a perfect thing. But where is the guarantee that it was entered by the person registered on the site? To finally verify the user&#8217;s identity, the system typically authenticates the user.<\/p>\n<p>Now, more and more often the <a href=\"https:\/\/www.protectimus.com\/\">two-factor authentication<\/a> is used. A usual static password serves as the first factor. The second factor may be different depending on the types of authentication methods used in this or that case:<\/p>\n<ul>\n<li>one-time password or PIN-code;<\/li>\n<li>magnetic stripe cards, smart cards, certificates with a digital signature;<\/li>\n<li>biometric factors: voice, retina, fingerprints, etc.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4881\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/11\/authentication-factors-1.png\" alt=\"Identification, authentication, and authorization \" width=\"600\" height=\"396\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/11\/authentication-factors-1.png 886w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/11\/authentication-factors-1-300x198.png 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/11\/authentication-factors-1-768x507.png 768w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/11\/authentication-factors-1-610x403.png 610w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/11\/authentication-factors-1-207x136.png 207w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/11\/authentication-factors-1-430x283.png 430w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Despite the rapid development of biometric authentication methods, they are not enough reliable when used remotely. It is not always possible to guarantee the correct operation of devices and applications which perform retina or fingerprints scanning. You cannot be 100% sure whether the mould of the hand or fake user\u2019s picture is used during verification. So this method can be considered valid only if authentication is directly controlled. For example, biometrics is quite efficient when the employee enters the office.<\/p>\n<p>Under the conditions when the verifier and the verified are remote, as it happens on the Internet, the 2-factor authentication method using one-time passwords works much better. There are various authentication means and you can always choose the most convenient for each case. This may be authentication via text messages, one-time passwords generated by a hardware token or a special application on a smartphone. The choice is by the user.<\/p>\n<p>Two-way authentication can be one-sided when the user proves his authenticity to the system, or bilateral when the server and the user mutually confirm their authenticity through &#8220;challenge-response&#8221; algorithm. This 2FA algorithm is used in Protectimus Ultra token and allows, among other things, to cut the risk of entering the phishing sites.<\/p>\n<p>The last phase of the user\u2019s entry is called authorization. Depending on whether identification and authentication were successful, the server either allows or does not allow the user to perform certain actions on the website.<\/p>\n<p>The difference between the terms &#8220;authorization&#8221; and &#8220;authentication&#8221; is quite significant. You can often hear or read on the Internet the term &#8220;two-factor authorization&#8221;, but it is not correct. User\u2019s authorization is the system\u2019s final answer to the question, &#8220;Can this user get access to this or that information or function?&#8221; And because of its uniqueness, the authorization cannot be two-factor.<\/p>\n<p>Yet, in order not to bring unnecessary confusion, this distinction is not usually emphasized. The two concepts are often used interchangeably.<\/p>\n<p>A clear understanding of what the identification, authentication, and authorization are will allow you to use the functions they provide correctly. The latter will be beneficial for the safety of the information you store on the Internet.<\/p>\n<span class=\"et_bloom_bottom_trigger\"><\/span>","protected":false},"excerpt":{"rendered":"<p>Identification, authentication, and authorization. We all face these three concepts every day, but not everyone knows the difference. Since these terms are essential in data protection, they deserve to be explained better. To begin, let\u2019s take an example from everyday life. It will help you to understand the difference between authentication and identification in general. [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":4527,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[3,15],"tags":[16,101,202,118,120,182,130,99],"class_list":["post-904","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-engineering","category-rd","tag-2fa","tag-biometric-authentication","tag-cybersecurity","tag-data-protection","tag-multifactor-authentication","tag-smart-identification","tag-sms-authentication","tag-two-factor-authentication"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/904","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/comments?post=904"}],"version-history":[{"count":6,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/904\/revisions"}],"predecessor-version":[{"id":6343,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/904\/revisions\/6343"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media\/4527"}],"wp:attachment":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media?parent=904"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/categories?post=904"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/tags?post=904"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}