internet.com
You are in the: Small Business Computing Channelarrow View Sites +
Small Business Technology
» ECommerce-Guide | Small Business Computing | Webopedia | WinPlanet |  »Close
Internet.com
Enter a word for a definition... ...or choose a computer category.
 
 

menu
   Home
   Term of the Day
   New Terms
   Pronunciation
   New Links
   Quick Reference
   Did You Know?
   Search Tool
   Tech Support
   Webopedia Jobs
   About Us
   Link to Us
   Advertising
  

talk to us
   Submit a URL
   Suggest a Term
   Report an Error

internet.com
Developer
Downloads
International
Internet Lists
Internet News
Internet Resources
IT
Linux/Open Source
Small Business
Windows Technology
Wireless Internet
xSP Resources

Search internet.com
Advertise
Corporate Info
Newsletters
Tech Jobs
E-mail Offers
commerce
  Be a Commerce Partner
 
 
 
 
 
 
 
 
 
 

authentication
Last modified: Tuesday, May 04, 2004 

The process of identifying an individual, usually based on a username and password. In security systems, authentication is distinct from authorization , which is the process of giving individuals access to system objects based on their identity. Authentication merely ensures that the individual is who he or she claims to be, but says nothing about the access rights of the individual.

E-mail this definition to a colleague

Sponsored listings

Qqest Software Systems: Security & Authentication Hardware - Offers employee attendance and scheduling software, time and attendance systems, biometric systems, and hardware.

IDresponse.com: Virtual Age & Identity Authentication - Sells online age, shipping, billing, identity verification and authentication tools for Ecommerce, Business and Financial markets. Results in seconds.


For internet.com pages about authentication . Also check out the following links!

Related Links

eSecurity Planet 
A resource for daily information on e-security targeted to IT managers. The site provides users with information from a variety of sources, including experts at security product and services firms, and the consultants who follow the security industry.

Mosaic user authentication tutorial
Surveys the current methods in NCSA Mosaic and NCSA HTTPd for restricting access to documents and provides set-up and use of these methods.

NCSA HTTPd tutorials
Contains links to several tutorials that focus on security-related, CGI and virtual hosting aspects of server set-up.

Network Security Buyer's Guide
Provides information about network security, utilities and virus protection. Offers a searchable database of products, links to vendor sites, and a library of white papers, press releases, and product presentations.

RFC 2069
Request for Comments paper on Digest Access Authentication.

Yahoo!'s user authentication page
Yahoo!'s directory of user authentication.

related categories

Digital Rights Management (DRM)

Security

related terms

AAA

accounting

authorization

backdoor

challenge-response

credential

EAP

false acceptance

false rejection

nonrepudiation

PEAP

S/key

SAML

session hijacking

single signon

TACACS

TCB


webopedia
Give Us Your
Feedback


Shopping
authentication Products
Compare Products,Prices and Stores

Shop by Category:
Network Management Tools
333 Model Matches

Software Utilities
235 Model Matches



JupiterWeb networks:

internet.comearthweb.comDevx.comClickZ

Search JupiterWeb:

Jupitermedia Corporation has four divisions:
JupiterWeb, JupiterResearch, JupiterEvents and JupiterImages

Copyright 2004 Jupitermedia Corporation All Rights Reserved.
Legal Notices, Licensing, Reprints, & Permissions, Privacy Policy.

Jupitermedia Corporate Info | Newsletters | Tech Jobs | E-mail Offers