Search results
Results from the Health.Zone Content Network
Learn how digest access authentication works, its advantages and disadvantages, and its history and standards. Digest access authentication is a method of verifying user identity with a web server using MD5 or SHA hashing and nonce values.
Learn how basic access authentication works in HTTP transactions, where a user agent provides a user name and password in a header field. Find out the features, security, and protocol of this method, and its alternatives and references.
WebAuthn is a W3C standard that allows users to authenticate to web applications and services using FIDO2 authenticators, which can be software or hardware devices. WebAuthn provides security, convenience, and interoperability benefits over traditional password-based authentication.
Single sign-on (SSO) is an authentication scheme that allows a user to log in with a single ID to multiple software systems. Learn about the advantages, drawbacks, and security issues of SSO, as well as related concepts such as same-sign on, federated authentication, and social logons.
Learn about CAS, a single sign-on protocol for the web that allows users to access multiple applications with one set of credentials. Find out the history, features and implementations of CAS and related software.
Multi-factor authentication (MFA) is an electronic authentication method that requires users to present two or more pieces of evidence to access a website or application. MFA protects personal data from unauthorized access and uses factors such as something the user has, knows, or is.
HTTPS is HTTP over TLS, a protocol that encrypts and authenticates the communication between a client and a server. HTTPS protects against eavesdropping, tampering, and man-in-the-middle attacks, and is widely used on the Internet.
Mutual authentication is a security step that can prevent many adversarial attacks, such as man-in-the-middle, replay, spoofing, and impersonation. Learn how mutual authentication works, what credentials are used, and how it is applied in IoT and mTLS.