Contents

About server authentication

   Apr 13, 2024     2 min read

This is an article about server authentication.

hello!

For those who want to learn about server authentication, this time we will learn about authentication, authorization, knowledge, possession, and behavior-based authentication.

Before starting the writing in earnest,

—Today’s TMI—

I received certification in word processing and computer literacy!

I looked at the questions without any self-study books or online lectures, and continued to solve past exam questions, but I did well on both the written and practical exams, so I passed!

Today has been a good day haha I hope you all have a good day too!

—TMI End—

Let’s get back to writing!

Server authentication is a very important concept in information security and is important to understand.

Authentication

Authentication is the process by which a user proves who they are.

Users trying to access a server often provide a username and password to prove their identity.

This information allows the server to verify who the user is and complete authentication.

Authorization

Authorization is the process of granting an authenticated user permission to access a specific resource or service.

For example, authorization determines whether an authenticated user can access a particular directory or modify a file.

Knowledge-based Authentication

Knowledge-based authentication is where users verify their identity by providing accurate answers to predefined questions.

For example, you must provide accurate answers to questions such as “Where were you as a child?” to complete the verification.

Possession-based Authentication

Possession-based authentication uses a physical device or media owned by the user to authenticate.

A representative example is entering a one-time authentication number sent via SMS.

This method completes authentication by verifying that the user owns the phone.

Behavior-based Authentication

Behavior-based authentication is a method of verifying a user’s identity by analyzing specific behavioral patterns.

Authentication is performed by analyzing the user’s typing style, mouse usage patterns, touch movements, etc.

This method is considered highly secure because it is based on the user’s characteristic behavior.

Server authentication can also be done by combining the various methods introduced above.

For example, after authenticating with an ID and password, a user can use the method of entering a one-time authentication number sent via SMS as an additional authentication step.

Conclusion

This is a brief introduction to the concept of server authentication.

To help you understand, we have included various authentication methods in the explanation. For more secure server authentication, it is recommended to use multiple authentication methods.

Each authentication method has its pros and cons, so it is important to use an appropriate combination to suit the situation.

thank you