Definition of

Authentication

Clue

In computing, authentication involves verifying identity.

Authentication is synonymous with authentication : the process and result of authenticating . This verb, in turn, refers to verifying the authenticity or legality of something or to the act of accrediting it as authentic .

As can be seen from these ideas , to understand what authentication is, it is essential to know what the concept of authentic refers to. Authenticity is that which is certified or documented as safe or true . Said certification and/or documentation procedure, in short, is what is known as authentication.

Authentication in computing

The notion of authentication is usually used in the field of computing when a computer (a computer) seeks to verify the digital identity of a sender who is trying to establish communication and connect to the computer. The sender can be a user (human), software (computer program), or another computer (machine).

Authentication, on the other hand, may be required by a system when someone tries to access it. Every time a person wants to check their email on a webmail platform, for example, they must enter their username and password . The system then proceeds to authenticate the user: it analyzes the data entered and compares it with the information available in its database. If the data matches (that is, is correct), authentication is complete and the system allows access. Otherwise, reject the request. Authentication, in this way, is a security mechanism.

To use an automated teller machine ( ATM ) or carry out an electronic commerce operation , it is also necessary to go through an authentication process.

Biometrics

Authentication can be done through fingerprint analysis.

Security measures

Authentication is just one of the three main steps in the processes that seek to guarantee the security of data networks . Although these vary depending on the system and the importance of the data that must be protected, broadly speaking we can define the following three:

  • Authentication : as explained above, it consists of the attempt to verify the identity of a user who wishes to establish a connection with a database.
  • Authorization : Once properly identified, the network allows the user to access some of its resources.
  • Audit : a record is carried out of all the accesses that the authorized user makes during their session.

Apple Authentication

The North American company Apple has an authentication system that it has called two-factor, thanks to which its users' ID has an extra layer of security. Simply put, the goal is to minimize the chances of someone accessing someone else's account , even if they know their victim's password.

Apple 's two-factor authentication allows users to define their trusted devices (such as a Mac , iPad , or iPhone ) so that they can only establish a connection from them. If you want to log in from one that has not been stored in the database, then you must specify two pieces of information: the password and a six-digit code that allows you to verify your identity.

To explain this authentication system in more depth, let's think about a user who has an iPad and wants to access their account for the first time from a Mac that they recently purchased. First, you'll need to enter your password on the new device, after which you'll need to copy a verification code that will automatically appear on your iPad . Needless to say, the only way to violate this security measure - not to mention a complex computer attack on Apple 's databases - is to steal both devices, in addition to finding out the owner's password.