Authentication Types
It’s involved with the process of checking the user’s credentials to make sure that they match with the credentials present in the database of the authorized users or the servers. The following are types of authentication methods with examples. One type is two -factor authentication, which involves the use of a second-factor authentication in addition to the password to gain access to a system. This helps in adding more security to the authentication process and systems which use this authentication type require the user to perform a series of activities. To be specific, the user is required to enter a verification code which is usually sent via the use of text message on a mobile phone that has been preregistered.
The code can also be generated by the application which has been authenticated. An example is when one wants to access an application, e.g. telegram via the laptop.one has to enter the password as well as the code sent to the mobile phone. Another authentication type is known as multifactor authentication, which is commonly used. Here, the user is required to authenticate using more than one factor. One of the elements needed for authentication includes a biometric aspect, e.g. a fingerprint, or the retina scan (Shepherd, 2019). Also, another factor relating to the possession, e.g. a security key which has been generated by the application authenticated.
A good example is the iPhone where to gain access; one enters the password, a fingerprint as well as a security key of the authenticated phone. Another authentication type is that which involves the use of a one-time password (Rouse, 2018). To be authorized, a password is automatically generated either in numeric or alphanumeric form. The user is required to enter this password at only one login session. An example of when this authentication type is used is when one wants to access an application, let’s say Facebook but can’t remember the password. One is usually mandated to create a new password.
REFERENCES
Rouse, M. (2018, May 29). What is authentication? – Definition from WhatIs.com. SearchSecurity. https://searchsecurity.techtarget.com/definition/authentication
Shepherd, J. (2019, October 7). Authentication methods. Okta. https://www.okta.com/security-blog/2019/02/the-ultimate-authentication-playbook/