This article needs additional citations for verification. (December 2009) |
An authentication server provides a network service that applications use to authenticate the credentials,[1] usually account names and passwords, of their users. When a client submits a valid set of credentials, it receives a cryptographic ticket that it can subsequently use to access various services.
Authentication is used as the basis for authorization, which is the determination whether a privilege may be granted to a particular user or process, privacy, which keeps information from becoming known to non-participants, and non-repudiation, which is the inability to deny having done something that was authorized to be done based on the authentication.
Major authentication algorithms include passwords, Kerberos, and public key encryption.
See also
editReferences
edit- ^ Hong, S.-M.; Lee, S.; Park, Y.; Cho, Y.; Yoon, H. (2000-11-01). "On the construction of a powerful distributed authentication server without additional key management". Computer Communications. 23 (17): 1638–1644. doi:10.1016/S0140-3664(00)00250-4.
External links
edit- "Server authentication". www.ibm.com. Retrieved 2023-09-05.
- Business server