What is Password-Based Authentication?
The Need for a Password
Security of all resources in the organisation lies in the complexity and secrecy of the password. If an attacker gets hold of a user’s password, he can impersonate the user and gain access to sensitive resources to which the user is entitled.
Password-Based Authentication is the most preferred method for the majority of resources in the organisation, requiring a username and password. The password-Based Authentication method gets its fondness for its simplicity, cost-effectiveness, ease of operability, and practicality.
How are Passwords Stored?
What are the Three Types of Authentications?
- Knowledge-based: Also known as “something you know.” This includes traditional passwords. When you, a user, create a unique password for your account, it becomes the key to entering an account repeatedly. It’s something that only the user (hopefully) knows.
- Possession-based: Also known as “something you have.” In this case, an individual verifies themselves using something only they would have. For instance, a user could swipe a physical key card to prove that they are who they claim to be.
- Inheritance-based: Also known as “something you are.” These are biometric characteristics such as a facial scan or a fingerprint that is used to verify an individual’s identity.
What are Password Alternatives?
How does Sectona Fulfil this Requirement?
- 1.1 What is Password-Based Authentication?
- 1.2 The Need for a Password
- 1.3 How are Passwords Stored?
- 1.4 What are the Three Types of Authentications?
- 1.5 What are Password Alternatives?
- 1.6 How does Sectona Fulfil this Requirement?
- 1.7 Related Concepts
- 1.8 Key-based Authentication Method: A Prominent Alternative
- 1.9 Privileged Single Sign On v/s Application Single Sign On
- 1.10 SAML Authentication Explained: Why is it used?