• Thumbnail for Authentication
    indicating a person or thing's identity, authentication is the process of verifying that identity. Authentication is relevant to multiple fields. In art...
    35 KB (4,025 words) - 21:20, 19 June 2025
  • Thumbnail for Multi-factor authentication
    Multi-factor authentication (MFA; two-factor authentication, or 2FA) is an electronic authentication method in which a user is granted access to a website...
    44 KB (4,843 words) - 11:05, 23 June 2025
  • An authenticator is a means used to confirm a user's identity, that is, to perform digital authentication. A person authenticates to a computer system...
    30 KB (3,661 words) - 07:54, 24 May 2025
  • Thumbnail for Basic access authentication
    'Basic' HTTP Authentication Scheme. Internet Engineering Task Force. sec. 2.1. doi:10.17487/RFC7617. RFC 7617. The 'Basic' HTTP Authentication Scheme. Internet...
    7 KB (863 words) - 12:00, 21 May 2025
  • Thumbnail for Digest access authentication
    July 2011. Digest access authentication was originally specified by RFC 2069 (An Extension to HTTP: Digest Access Authentication). RFC 2069 specifies roughly...
    25 KB (2,879 words) - 04:06, 25 May 2025
  • Mutual authentication or two-way authentication (not to be confused with two-factor authentication) refers to two parties authenticating each other at...
    24 KB (3,032 words) - 11:26, 14 March 2025
  • cryptography, a message authentication code (MAC), sometimes known as an authentication tag, is a short piece of information used for authenticating and integrity-checking...
    16 KB (1,918 words) - 17:55, 22 January 2025
  • Thumbnail for Single sign-on
    services without re-entering authentication factors. It should not be confused with same-sign on (Directory Server Authentication), often accomplished by using...
    20 KB (2,292 words) - 14:47, 25 May 2025
  • Integrated Windows Authentication (IWA) is a term associated with Microsoft products that refers to the SPNEGO, Kerberos, and NTLMSSP authentication protocols...
    10 KB (892 words) - 18:31, 26 May 2024
  • WebAuthn (redirect from Web Authentication)
    build a system of authentication for web-based applications that solves or mitigates the issues of traditional password-based authentication. Zero-knowledge...
    30 KB (3,086 words) - 09:16, 9 June 2025
  • Extensible Authentication Protocol (EAP) is an authentication framework frequently used in network and internet connections. It is defined in RFC 3748...
    34 KB (4,172 words) - 20:50, 1 May 2025
  • In cryptography, deniable authentication refers to message authentication between a set of participants where the participants themselves can be confident...
    3 KB (327 words) - 01:03, 22 December 2024
  • Thumbnail for Google Authenticator
    Google Authenticator is a software-based authenticator by Google. It implements multi-factor authentication services using the time-based one-time password...
    9 KB (943 words) - 05:34, 25 May 2025
  • Thumbnail for HMAC
    either keyed-hash message authentication code or hash-based message authentication code) is a specific type of message authentication code (MAC) involving...
    18 KB (2,316 words) - 18:51, 16 April 2025
  • may log in using any authentication mechanism supported by the server. It is mainly used by submission servers, where authentication is mandatory. SMTP...
    10 KB (1,229 words) - 16:16, 6 December 2024
  • answer ("response") to be authenticated. The simplest example of a challenge-response protocol is password authentication, where the challenge is asking...
    11 KB (1,540 words) - 09:38, 23 June 2025
  • Domain-based Message Authentication, Reporting and Conformance (DMARC) is an email authentication protocol. It is designed to give email domain owners...
    32 KB (3,717 words) - 14:28, 24 May 2025
  • NAUTH Number of authentication methods supported, uint8 AUTH Authentication methods, 1 byte per method supported The authentication methods supported...
    20 KB (2,273 words) - 16:47, 30 May 2025
  • Kerberos (/ˈkɜːrbərɒs/) is a computer-network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure...
    27 KB (3,023 words) - 15:26, 31 May 2025
  • Key/Config-authentication is used to solve the problem of authenticating the keys of a person (say "person A") that some other person ("person B") is...
    4 KB (584 words) - 20:34, 18 October 2024
  • HTTP authentication may refer to: Basic access authentication Digest access authentication This disambiguation page lists articles associated with the...
    155 bytes (43 words) - 19:24, 28 December 2019
  • Remote Authentication Dial-In User Service (RADIUS) is a networking protocol that provides centralized authentication, authorization, and accounting (AAA)...
    33 KB (2,792 words) - 14:22, 16 September 2024
  • (in other words, it is unforgeable: the encrypted message includes an authentication tag that the sender can calculate only while possessing the secret key)...
    19 KB (2,087 words) - 09:30, 22 June 2025
  • components: the transport layer provides server authentication, confidentiality, and integrity; the user authentication protocol validates the user to the server;...
    41 KB (4,509 words) - 04:58, 21 June 2025
  • IPsec (redirect from Authentication Header)
    Protocol (IP) networks. It supports network-level peer authentication, data origin authentication, data integrity, data confidentiality (encryption), and...
    44 KB (5,337 words) - 03:03, 15 May 2025
  • In information security, message authentication or data origin authentication is a property that a message has not been modified while in transit (data...
    6 KB (612 words) - 10:29, 1 June 2025
  • the authentication. Major authentication algorithms include passwords, Kerberos, and public key encryption. TACACS+ RADIUS Multi-factor authentication Universal...
    2 KB (174 words) - 07:48, 24 May 2025
  • Thumbnail for Passwordless authentication
    Passwordless authentication is an authentication method in which a user can log in to a computer system without entering (and having to remember) a password...
    16 KB (1,670 words) - 03:25, 25 May 2025
  • Internet Authentication Service (IAS) is a component of Windows Server operating systems that provides centralized user authentication, authorization...
    5 KB (570 words) - 11:35, 13 April 2025
  • authentication protocol is a type of computer communications protocol or cryptographic protocol specifically designed for transfer of authentication data...
    10 KB (1,192 words) - 23:19, 10 July 2024