authentication protocols in computer networking
User authentication is the first most priority while responding to the request made by the user to the software application. There are several mechanisms made which are required to authenticate the access while providing access to the data. In this blog, we will explore the most common authentication protocols and will try to explore their merits and demerits.
Specifications of encryption-based protocols using conventional and public-key encryption schemes are discussed for authentication of users or systems in a computer network environment. The protocols treat a sender and a receiver symmetrically and make no assumption about any specific time ordering of events. We apply state machine modeling and analysis techniques to determine important properties of these protocols including completeness, deadlock freeness, livelock or tempo-blocking freeness, termination, boundedness, and absence of non-executable interactions.
OAuth2 :
OAuth as the name suggests it is an authorization framework that promotes granting limited access to the user on its account through an HTTP service. When a user requests access to resources an API call is made and after the authentication token is passed.
Some advantages of OAuth2 :
It is a simple protocol and is easy to implement.
It provides server-side authorization of code.
Some disadvantages of OAuth2 :
It is vulnerable to manage different sets of code.
It shows serious effects on sites connected to another affected system.
5 Common Authentication Types
Password-based authentication. Passwords are the most common methods of authentication.
Multi-factor authentication.
Certificate-based authentication.
Biometric authentication.
Token-based authentication.
OAuth2 protocol
The OAuth2 protocol is often used, casually, for identity and authentication using user data, such as an identifier, returned in the OAuth2 process.
No comments:
Post a Comment