Tech Terminology: Authentication

Tech Terminology: Authentication

Authentication isn’t an unfamiliar aspect in everyday life. Driver’s licenses, library cards, and PIN numbers are all forms of identity authentication. However, as computers have become a cornerstone of everyday life, the most commonly-used way to confirm one’s identity has almost assuredly become the username/password login combination. Today, we’ll take a deeper dive into what authentication is.

How Authentication Differs from Authorization
As we briefly mentioned above, authentication is simply the process of confirming that yes, someone is in fact who they claim to be. While the two are often correlated, this process is different than that of authorization, which is the process of using that confirmed identity to grant access to information or materials. This access is the real difference between the two, yet without authentication, access cannot be authorized.

How Authentication Works
When a user provides their credentials, they are compared to the credentials that are already in a database. If these credentials match, the user is then given the authorization that their identity has been assigned.

Two-Factor Authentication
In the interest of boosting security, many organizations have implemented two-factor authentication, often referred to by the shorthand 2FA. 2FA incorporates an additional factor into the authentication process beyond the typical username and password.

This process commonly involves an additional code being provided to the user via email or text message when they attempt to access the account protected by 2FA. This one-time code is required for them to get in, meaning that someone attempting to access an account also needs access to the user’s email or phone in order to successfully do so. This is why 2FA has been so widely adopted by security-minded businesses.

If you’re interested in adding another layer of protection to the business accounts that you and your users leverage, reach out by calling 978-482-2020. BNMC has the experience needed to improve your security through two-factor authentication and many other means.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, January 21 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Email Cloud Privacy Malware Business Computing Hackers Network Security Business Tech Term User Tips Computer Google Software Internet Microsoft IT Services Efficiency Hosted Solutions Ransomware Mobile Devices Productivity Communication IT Support Android Data Hardware Smartphone Small Business Backup Saving Money Managed IT Services Internet of Things Managed IT Services Data Recovery Browser Business Continuity Cloud Computing Innovation Windows 10 Windows Data Management Data Backup Business Management Workplace Tips App Microsoft Office Cybersecurity Productivity Upgrade Server Facebook Phishing Remote Monitoring Office 365 Gmail Artificial Intelligence Outsourced IT Word Disaster Recovery Encryption Windows 10 Mobile Device Passwords Chrome Managed Service Provider Infrastructure Analytics Vulnerability communications Network Applications Website IT Support Money BYOD Employer-Employee Relationship Smartphones Tip of the week Miscellaneous Settings Antivirus Automation Information Users YouTube Access Control Maintenance Government Social Media IT Management Risk Management Data storage Office Tips Router Big Data Company Culture Paperless Office VoIP Google Drive Managed Service Bandwidth Robot Content Filtering Save Money Avoiding Downtime Managing Stress Scam Education Unified Threat Management End of Support Apple Data loss Development Storage Telephone Systems Virtual Reality Printing Networking desktop HIPAA VPN Firewall SaaS Mobile Security Data Security Hacker Document Management Holiday Business Technology Server Management Virtual Private Network Touchscreen Outlook Wireless Spam Computing Quick Tips Business Intelligence Alert Laptop WiFi Display Operating System Tablet The Internet of Things LiFi Hosted Solution Vendor Management Employee-Employer Relationship Administration Monitors Downtime Mouse Two-factor Authentication Cryptocurrency Patch Management Managed IT Service Computing Infrastructure Google Maps Professional Services Marketing LED Apps User Error Social Networking Social Engineering Specifications Star Wars Websites Gadgets PowerPoint IT solutions Going Green Customer Relationship Management Chatbots eWaste Google Docs Hacks Wearable Technology Network upgrade Mobility Heating/Cooling Multi-Factor Security Nanotechnology Bitcoin Break Fix Alerts USB Co-Managed IT Google Wallet Time Management Printer Motherboard Cables Safety Search Black Friday Fraud Digital Payment Cost Management Halloween Onboarding Identity Continuity Remote Computing Business Growth Screen Reader Digital Charging Slack Password Emergency Disaster Smart Office Network Congestion Print Toner Legal Servers Google Calendar Windows 8 Dark Web Collaboration Licensing Dongle Content Unified Communications Drones Network Management Wires Cyber Monday Assessment Wi-Fi Scary Stories Digital Signage Solar Writing Smart Tech Spyware Running Cable Monitoring Mobile Device Management Uninterrupted Power Supply Work Computers Shortcuts Deep Learning Legislation Microsoft Excel File Sharing Cooperation Service Level Agreement Dark Data Update Buisness Streaming SharePoint Computer Care IBM Voice over Internet Protocol Managed IT Smart Technology Hotspot Internet Exlporer Sports Troubleshooting Techology Compliance Solid State Drive Retail Virtual Desktop Alt Codes Identity Theft Connectivity Politics Spying How To Lenovo IT Technicians Optimization Security Cameras Bring Your Own Device Statistics Analysis Social Mail Merge Blockchain Staff Leominster Customer Service Human Error Budget Downloads Training Modem Corporate Profile FinTech Typing Humor Shortcut Distributed Denial of Service Automobile Language Value Information Technology VoIP Unified Threat Management Regulations Hard Disk Drive Office Samsung Comparison IoT Tech Support Current Events Firefox Superfish Mirgation Dell Recycling Best Practice Bluetooth Cybercrime Address Permissions Augmented Reality Cabling K-12 Schools Chromebook Device Cookies WannaCry MSP Administrator Electronic Medical Records Taxes Notifications IT Budget Physical Security Web Server what was your? Twitter Upgrades Gadget Emoji GPS IT Consultant Crowdsourcing Personal Information Botnet Cameras 3D Printing Meetings Cortana Tracking Cleaning BDR Machine Learning CCTV Processors Regulation Unsupported Software Webcam Virtualization Error Computer Repair Relocation Mobile Data Mobile Computing Point of Sale Ben McDonald shares Travel Recovery How To Work/Life Balance Health Private Cloud Printers G Suite Supercomputer CrashOverride Black Market Managed Services Law Enforcement Motion Sickness Staffing

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3