ABSTRACT

This chapter describes the most representative user authentication methods currently available, such as passwords and PINs, authentication tokens, mobile phone as a token authentication method, Kerberos, biometrics, and single sign-on. Security systems are conceived to allow authorized users in and to keep unauthorized users out of an organization’s network resources. In addition, the security system needs to make sure that users only perform actions they are authorized to perform. Identification, authentication, and authorization are distinct and necessary components that allow users to securely access a computer system. In private and public computer networks, authentication is popularly done through the use of logon passwords. The framework is centered around the business assets to be protected, which are identified and prioritized through the security strategy and management. The security management is in charge of a coordinating and supervising the different security services.