Search results
Results from the Health.Zone Content Network
A user wielding a user agent (usually a web browser) is called the subject in SAML-based single sign-on. The user requests a web resource protected by a SAML service provider. The service provider, wishing to know the identity of the user, issues an authentication request to a SAML identity provider through the user agent.
In the context of an HTTP transaction, basic access authentication is a method for an HTTP user agent (e.g. a web browser) to provide a user name and password when making a request. In basic HTTP authentication, a request contains a header field in the form of Authorization: Basic <credentials>, where <credentials> is the Base64 encoding of ID ...
Hardt, Dick (October 2012). "The OAuth 2.0 Authorization Framework". OAuth (short for open authorization[1][2]) is an open standard for access delegation, commonly used as a way for internet users to grant websites or applications access to their information on other websites but without giving them the passwords. [3][4] This mechanism is used ...
WebAuthn. Web Authentication (WebAuthn) is a web standard published by the World Wide Web Consortium (W3C). [1][2][3] WebAuthn is a core component of the FIDO2 Project under the guidance of the FIDO Alliance. [4] The goal of the project is to standardize an interface for authenticating users to web-based applications and services using public ...
Multi-factor authentication (MFA; two-factor authentication, or 2FA, along with similar terms) is an electronic authentication method in which a user is granted access to a website or application only after successfully presenting two or more pieces of evidence (or factors) to an authentication mechanism. MFA protects personal data —which may ...
Smart card. A smart card (SC), chip card, or integrated circuit card (ICC or IC card), is a card used to control access to a resource. It is typically a plastic credit card-sized card with an embedded integrated circuit (IC) chip. [1] Many smart cards include a pattern of metal contacts to electrically connect to the internal chip.
A security token is a peripheral device used to gain access to an electronically restricted resource. The token is used in addition to, or in place of, a password. [1] Examples of security tokens include wireless key cards used to open locked doors, a banking token used as a digital authenticator for signing in to online banking, or signing ...
Electronic authentication. Electronic authentication is the process of establishing confidence in user identities electronically presented to an information system. [1] Digital authentication, or e-authentication, may be used synonymously when referring to the authentication process that confirms or certifies a person's identity and works.