Skip to content

ID-zxorg

Server Authentication Security Conference

919-768-8642

TimGalarza@zxid.org

  • Home
  • About
  • Program
    • September 8
    • September 9
    • September 10
  • Our Blog
  • Contacts
  • Home
  • About
  • Program
    • September 8
    • September 9
    • September 10
  • Our Blog
  • Contacts
desktop

What the authentication server does not do

October 19, 2022July 12, 2023 Galarza TimOur Blog

An authentication server does a lot of work in the background, but it’s also important to understand what it’s not responsible for.

Authentication vs. authorization

In the examples above, the authentication server took steps to verify the user’s identity and return it to the requesting application. What happens next depends on the application.

Once the application knows who the user is, it usually has to decide what the user can access. This is known as authorization.

Authorization – Authorization refers to the process of verifying what a user has access to.

Authentication is the process of proving identity.

It is easy to confuse authentication and authorization, but it is important to understand the difference. The authentication process does not determine what a user can access.

The authentication server simply verifies the identity of the user and then passes this information back to the application. The application then uses this identity information to determine what the current user can access.

To manage access control, the authentication server will issue access tokens to the client that list what permissions the current user has. If you want to learn more about access tokens, check out the free eBook below. It explains in detail about the popular JSON Web Token (JWT) standard.

So, although these two terms have completely different meanings, the authorization process depends on authentication. Authorization cannot be granted unless the user’s identity is verified.

Since these two processes go hand in hand, it’s common to see a solution that can handle both authentication and authorization. Auth0, for example, is an end-to-end solution that serves as both an authentication and authorization server.

Read More

Post navigation

Previous: What is an authentication server?
Next: Multi-factor authentication

Search by word

Blog

  • MT4 for iPhone: Secure Trading with Strong Authentication
  • How to Minimizе thе Human Factor in Sеcuring Authеntication Sеrvеrs
  • Using Artifiсial Intelligenсe to Prevent Attaсks on Authentiсation Servers
  • The Future of Server Authentiсation: Transitioning to Passwordless Teсhnologies
  • Top Authentication Trends Discussed at Security Conferences: Insights for Your Bachelor’s Thesis

Program

  • September 8
  • September 9
  • September 10
June 2025
M T W T F S S
 1
2345678
9101112131415
16171819202122
23242526272829
30  
« Feb    

Main

  • Home
  • About
  • Contacts
  • Privacy Policy

Program

  • September 8
  • September 9
  • September 10

Blog

  • MT4 for iPhone: Secure Trading with Strong Authentication
  • How to Minimizе thе Human Factor in Sеcuring Authеntication Sеrvеrs
  • Using Artifiсial Intelligenсe to Prevent Attaсks on Authentiсation Servers
  • The Future of Server Authentiсation: Transitioning to Passwordless Teсhnologies
  • Top Authentication Trends Discussed at Security Conferences: Insights for Your Bachelor’s Thesis

Phone Number: 
919-768-8642
E-Mail: 
TimGalarza@zxid.org
Location: 
3781 Stratford Court, Morrisville

Copywrite 2023