03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

knowledge<br />

based<br />

user name/password<br />

digital certificates<br />

key based<br />

harware key<br />

symmetric encription<br />

base<br />

authentication<br />

mechanisms<br />

voice password<br />

biometric<br />

retinal images<br />

finger print<br />

Figure 2-1 Base authentication mechanisms<br />

The following paragraphs will discuss some of the authentication mechanisms<br />

used in IT systems.<br />

User name and password<br />

User name and password are the common method for authentication. The user<br />

who wants to access the system provides a user name and a password for login,<br />

which will be compared with the values stored in the system.<br />

Physical keys<br />

Physical keys are objects that can be used to prove the identity of the object<br />

holder. Physical keys can be a piece of metal used to unlock your computer, a<br />

hardware device that is plugged into the computer to execute certain programs<br />

or smart cards that have an embedded memory or microprocessor.<br />

Biometric authentication<br />

Biometric authentication is the use of physiological or behavioral characteristics<br />

used to verify the identity of an individual. The biometric authentication consists<br />

of comparing the physical characteristics of an individual against the values of<br />

those characteristics stored in a system.<br />

Delegation<br />

Delegation is the ability to leave an intermediary to do the work initiated by a<br />

client according to a delegation policy.<br />

Chapter 2. <strong>Security</strong> fundamentals 9

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!