Authentication - Access Control

Access Control

One familiar use of authentication and authorization is access control. A computer system that is supposed to be used only by those authorized must attempt to detect and exclude the unauthorized. Access to it is therefore usually controlled by insisting on an authentication procedure to establish with some degree of confidence the identity of the user, granting privileges established for that identity. Common examples of access control involving authentication include:

  • Asking for photoID when a contractor first arrives at a house to perform work.
  • Using captcha as a means of asserting that a user is a human being and not a computer program.
  • A computer program using a blind credential to authenticate to another program
  • Entering a country with a passport
  • Logging in to a computer
  • Using a confirmation E-mail to verify ownership of an e-mail address
  • Using an Internet banking system
  • Withdrawing cash from an ATM

In some cases, ease of access is balanced against the strictness of access checks. For example, the credit card network does not require a personal identification number for authentication of the claimed identity; and a small transaction usually does not even require a signature of the authenticated person for proof of authorization of the transaction. The security of the system is maintained by limiting distribution of credit card numbers, and by the threat of punishment for fraud.

Security experts argue that it is impossible to prove the identity of a computer user with absolute certainty. It is only possible to apply one or more tests which, if passed, have been previously declared to be sufficient to proceed. The problem is to determine which tests are sufficient, and many such are inadequate. Any given test can be spoofed one way or another, with varying degrees of difficulty.

Read more about this topic:  Authentication

Famous quotes containing the words access and/or control:

    Power, in Case’s world, meant corporate power. The zaibatsus, the multinationals ..., had ... attained a kind of immortality. You couldn’t kill a zaibatsu by assassinating a dozen key executives; there were others waiting to step up the ladder; assume the vacated position, access the vast banks of corporate memory.
    William Gibson (b. 1948)

    I have not ceased being fearful, but I have ceased to let fear control me. I have accepted fear as a part of life, specifically the fear of change, the fear of the unknown, and I have gone ahead despite the pounding in the heart that says: turn back, turn back, you’ll die if you venture too far.
    Erica Jong, U.S. author. In an essay in The Writer on Her Work, ch. 13 (1980)