Difference between revisions of "Authorization and Authentication"
Jump to navigation
Jump to search
Line 1: | Line 1: | ||
In data security, the differences between [[ | In data security, the differences between [[Authorization]] and [[Authentication]] can be listed as follows: | ||
Latest revision as of 11:25, 3 February 2022
In data security, the differences between Authorization and Authentication can be listed as follows:
Authentication | Authorization |
---|---|
Verification of Identity | Determines whether certain resources can be given access |
Grant access by verifying relevant credentials | Determines certain level of access rights to certain resources, given information regarding identity |
Systems often first authenticate then authorize activities | Systems often authorize access after authentication |
References
- ↑ Difference Between.Net, Difference between Authentication and Authorization, URL:http://www.differencebetween.net/technology/difference-between-authentication-and-authorization/