Authentication
Authentication (from Greek: αὐθεντικός authentikos, “real, genuine”, from αὐθέντης authentes, “author”) is the act of proving an assertion, such as the identity of a computer system user. In contrast with identification, the act of indicating a person or thing’s identity, authentication is the process of verifying that identity. It might involve validating personal identity documents, verifying the authenticity of a website with a digital certificate, determining the age of an artifact by carbon dating, or ensuring that a product or document is not counterfeit.
Authentication uses protocols to verify that the identity requesting access to a cloud computing system is actually who they say they are. Common authentication protocols include but are not limited to the following:
- AKA
- Basic access authentication
- CAVE-based authentication
- CHAP – Challenge-handshake authentication protocol
- CRAM-MD5
- Digest
- EAP – Extensible Authentication Protocol
- Host Identity Protocol (HIP)
- LAN Manager
- NTLM, also known as NT LAN Manager
- OpenID protocol
- Password-authenticated key agreement protocols
- Protocol for Carrying Authentication for Network Access (PANA)
- Secure Remote Password protocol (SRP)
- RFID-Authentication Protocols
- Woo Lam 92 (protocol)
- PAP – Password Authentication Protocol
- SAML
- TACACS, XTACACS and TACACS+
- RADIUS
- DIAMETER
- Kerberos (protocol)
Source: https://www.wikiwand.com/en/Authentication