Difference between revisions of "Authentication"
From MgmtWiki
Line 6: | Line 6: | ||
==Problems== | ==Problems== | ||
− | There are multiple process that can be used to attach identity to the user trying to access a computer resource. After many years of trying to define the terms used in the previous sentence<ref>NIST https://doi.org/10.6028/NIST.SP.800-63-3</ref>, it has become clear that the sentence does not carry sufficient information to determine what it means. | + | There are multiple process that can be used to attach identity to the user trying to access a computer resource. After many years of trying to define the terms used in the previous sentence<ref>NIST ''Digital Identity Guidelines'' https://doi.org/10.6028/NIST.SP.800-63-3</ref>, it has become clear that the sentence does not carry sufficient information to determine what it means. |
==Solution== | ==Solution== |
Revision as of 12:57, 15 June 2018
Full Title or Meme
The process of determining who a user is.
Context
In the early days of computer networking is was convenient to distinguish the process of identification of a user from the process of determining the Authorization of what resources that user could access.
Problems
There are multiple process that can be used to attach identity to the user trying to access a computer resource. After many years of trying to define the terms used in the previous sentence[1], it has become clear that the sentence does not carry sufficient information to determine what it means.
Solution
Abandon the use of the term Authentication.
Reverences
- ↑ NIST Digital Identity Guidelines https://doi.org/10.6028/NIST.SP.800-63-3