Skip to content
LogoTechnipages
LogoTechnipages
  • Topics
        • Android
        • Browsers
        • Gaming
        • Hardware
        • Internet
        • iPhone
        • Linux
        • macOS
        • Office
        • Reviews
        • Software
        • Windows
        • Definitions
        • All Recent Posts
  • Product Reviews
  • About

What Is Authentication?

Mel HawthorneJanuary 23, 2023 Comments (0)
fix 1password authentication error

To gain access to many computer systems, you need to authenticate yourself. Authentication is the process of proving your identity. In computing, this is typically done in two parts. The first is alleging your identity; the second is providing some evidence. The classic example is using a username to allege your identity and then providing a password to prove it. Another form of authentication could be a challenge-response interaction.

Contents

  • 1 Usefulness in the Modern World
  • 2 Something You Know, Something You Have, and Something You Are
  • 3 The Best of Both Worlds
  • 4 Conclusion

Usefulness in the Modern World

Authentication is critical to the function of the modern digital world. The first form of authentication is to your device. While you may not necessarily have a password on your computer, you likely have some form of authentication to access your smartphone. Without this step, anyone could access any device they had physical access to.

Authentication is doubly important when signing into an online service. The most obvious instance is you proving your identity to the website. This allows you to sign into your account and prevents other people from accessing it. Authentication is also essential in verifying that you’re connecting to the website you think you are.

HTTPS and other encrypted connections utilize a certificate system to authenticate the website to the user. As part of a strong cryptographic system, the certificate system allows the user to authenticate that they have a secure connection directly to the specified web server and that no intermediary parties can “listen” to the secure communications.

Tip: It is important to note that HTTPS certificates do not indicate that the website is legitimate or even the site that the user wanted to connect to. It only verifies that the connection to the typed website is secure from snooping. Malware, phishing, and spam can all be served with legitimate certificates.

Something You Know, Something You Have, and Something You Are

The most basic form of authentication is the username and password. This relies on the secrecy of something you know, your password. This comes with the ability to deliberately give your password away, perhaps to let a family member access your device or password. It also leaves you open to being tricked into giving it away. A common method for this to happen is phishing. Depending on your chosen password, it may also be possible to guess.

Another form of authentication involves the use of a physical token. This type of authentication relies on something you have. This has the advantage that you can be limited to a single copy, making it impossible to share access. However, it has big consequences if your physical token is lost or stolen. Not only can you not access the system reliant on it, but the thief can, assuming they know what system uses it. This is why many RFID access badges are unbranded and plain. It means a thief can’t immediately know which building they can access.

The final field of authentication is biometrics. This involves verifying something about your person. The most common example is your fingerprint, but face scans, iris scans, and voice prints can be used, amongst other techniques. Biometric authentication techniques are excellent ways to verify identities but have some problems. For one thing, many of these features are somewhat public.

For example, you typically leave fingerprints on many surfaces, and with high-quality photos, even that isn’t necessary. Another particular issue is that you can’t change biometric features if they are compromised. Once your fingerprints are public, anyone can use them. Conversely, an accident could change a range of biometric features, locking you out of your account.

The Best of Both Worlds

While each form of authentication comes with its own issues, they can be highly effective combined. Two-Factor Authentication of 2FA uses the above techniques to authenticate your identity. MFA or Multi-Factor Authentication is the same but may extend to more than two factors.

This concept relies on the fact that most attackers with the ability to perform one type of attack can’t typically also perform the other types of attacks too. For example, a hacker with your password usually won’t have access to your smartphone’s authenticator app. Conversely, a thief with your smartphone might have your authenticator app but doesn’t have your password.

Biometric attacks generally cause you to be specifically targeted. The other types of attacks are typically opportunistic. An attacker dedicated enough to target you and your biometric details is likely capable of performing different attacks too. Such an attacker is also a lot less common and not a risk to most people, who won’t be interesting enough to be chosen as a target.

Conclusion

Authentication is the process of verifying identity. This is typically done through something you know, something you have, something you are, or some combination of the three. Secret passwords are a standard form of authentication, though certificates and challenge-response processes also work based on knowledge.

Physical security tokens, including smartphone 2FA apps, allow you to prove your identity through ownership of a specific item. Biometrics will enable you to be identified by your features. Combining these forms of authentication significantly increases confidence in the authentication process and makes it much harder for hackers to access your accounts.

Categories: Internet

Author Mel Hawthorne

You Might Also Like

  • Twitch.tv: How to Restrict Chat to Followers-Only Mode

    Mel HawthorneInternet
  • Google Search: How to See Grogu from the Mandalorian in Your Living Room

    Judy SanhzInternet
  • Zoom: How to See Your Webcam When You’re Talking

    Mel HawthorneInternet
  • Zoom: How to Use the Space Key to Unmute Your Microphone

    Mel HawthorneInternet

Leave a Reply

Your email address will not be published. Required fields are marked *

how to allocate more memory to a program

How to Allocate More Memory to a Program in Windows

marvel rivals memory leak fix

Marvel Rivals Using Too Much Memory – How to Fix

how to create a macro in word

How to Create a Macro in Word

how to set video as screen saver

How to Set a Video as Your Screen Saver on Windows 11

how to fix 0xc000007b Error

Error 0xc000007b – What Is It and How to Fix It

profile pic

The Experts Behind Technipages

My name is Mitch Bartlett. I've been working in technology for over 20 years in a wide range of tech jobs from Tech Support to Software Testing. I started this site as a technical guide for myself and it has grown into what I hope is a useful reference for all.

Learn More

technipages logo white
linkedin icon

Technipages is part of Guiding Tech Media, a leading digital media publisher focused on helping people figure out technology. Learn more about our mission and team here.

© 2025 Guiding Tech Media All Rights Reserved

  • About Us
  • Contact
  • Legal & Privacy

© 2025 Guiding Tech Media All Rights Reserved

Information from your device can be used to personalize your ad experience.
Do not sell my personal information.

Last Updated on January 23, 2023 by Judy Sanhz