Authentication
The process of verification that an individual or entity is who they/it claims to be.
Authentication Factors
Knowledge Authentication Factors
Something the user Knows:
Password, PIN, Security Question.
Ownership Authentication Factors
Something the user has:
Wrist band, Credit Card, ID, Security Token.
Inherence Authentication Factors
Something that the user is:
Fingerprint, retinal pattern, facial recognition.
Entropy
Is a measure of how unpredictable a password is based on the selection process. Entropy is not a measure of the password itself, but what it could have been. The higher the Entropy the stronger the password.
Password Rules
Authentication Process
JWT (JSON Web Tokens)
On login, the server generates a Secure Token with a JSON payload and a signature.
Claim
The payload containing information about the user, when it expires, and what the user is allowed to do (Authorizations).
Parts of a JWT Token
Header JWT Token
Contains the Algorithm used to generate the Token and the type of Token generated
Payload JWT Token
Contains the user’s “claim”. Who they are and what they can do.
Signature JWT Token
Contains information the API server can use to verify that the JWT token is valid.
Authorization
Is the process of giving users to access specific resources or functionality in an application. Authorities or Access Controls determine what privileges a user has within an application.
Role-Based Authorization
Permission-Based Authorization
Difference between Authorization and Authentication
Is the process of giving users to access specific resources or functionality in an application and The process of verification that an individual or entity is who they/it claims to be.