Struggling to tell your APIs from your CDNs? Read our comprehensive cloud computing glossary covering the most common terms.
< Back to glossary
User authentication is the process of confirming the identity of users trying to access a system, network, or device. It protects sensitive data or resources from being accessed by anyone other than the authorized people by verifying their identity using different means.
Single-Factor Authentication (SFA): One factor, most commonly a username and password, which is the simplest form of authentication but the least secure.
Two-Factor Authentication (2FA): Demands two factors like a password and one-time passcode sent to your SMS or email, thus strengthening security through the addition of a second step.
Multi-Factor Authentication (MFA): Encompasses various factors with maximum security assurance since it compels users to navigate more than two verification checkpoints.
Biometric Authentication: Incorporates the distinct physiological or behavioral traits of the individual, including fingerprints, face recognition, or voice acknowledgment, for authentications.
Certificate-Based Authentication: Uses digital certificates issued by a trusted party to authenticate identities, commonly employed in secure environments.
Token-Based Authentication: Uses tokens, e.g., JSON Web Tokens (JWT), to authenticate without the use of passwords.
Entering Credentials: Users provide their login credentials, e.g., usernames and passwords.
Process of Verification: The system verifies these credentials against saved data to establish identity.
Access Granting: Access is granted if credentials match; otherwise, access is denied.
Security: Prevents unauthorized access by authenticating user identities.
Compliance: Assists organizations in complying with security standards and regulations.
User Experience: Increases trust and satisfaction by providing secure interactions.
Think about a banking app that employs multi-factor authentication. Users authenticate with their password and username (something they know), and then they get a one-time code through SMS (something they have). This makes the security very strong, and it is hard for unauthorized users to access accounts.
Security Measures: Use strong authentication techniques such as MFA to improve security.
User Experience: Achieve balance between security and convenience to prevent infuriating users through overly cumbersome authentication procedures.
Compliance: Satisfy laws and regulations pertaining to authenticating methods.