Information Security 18 - Identification and Authentication of Local and Distributed Systems
Information Security 18 - Identification and Authentication of Local and Distributed Systems
ArfanShahzad.com
Course Outline
ArfanShahzad.com
Identification and Authentication of
Local and Distributed Systems
• “Identification and authentication” are two distinct but closely related
concepts in the context of both local (single-system) and distributed
(networked) systems.
• They play a crucial role in ensuring the security and access control of
users and entities within these systems.
ArfanShahzad.com
Identification and Authentication of
Local and Distributed Systems cont…
• Identification: Identification is the process by which a user or entity
claims an identity, such as a username or account number, within a
system.
ArfanShahzad.com
Identification and Authentication of
Local and Distributed Systems cont…
• Local Systems: In a local system (e.g., a single-user computer or a
stand-alone application), identification might involve the user
entering a username or selecting a profile.
ArfanShahzad.com
Identification and Authentication of
Local and Distributed Systems cont…
• Distributed Systems: In a distributed system (e.g., a networked
application or a multi-user server), identification usually occurs when
a user provides a username or other identifying information during
the login process.
• The distributed system then associates this identifier with the user's
account or role within the network.
ArfanShahzad.com
Identification and Authentication of
Local and Distributed Systems cont…
• Authentication: Authentication, on the other hand, is the process of
verifying whether the claimed identity is valid and belongs to the
entity making the claim.
• Authentication ensures that the user is who they say they are and
that they have the necessary credentials to access the system or
resources within it.
ArfanShahzad.com
Identification and Authentication of
Local and Distributed Systems cont…
• Local Systems: In local systems, authentication may involve entering a
password, PIN, fingerprint, or other credentials to prove that the
person interacting with the system is the authorized user of that
account or device.
ArfanShahzad.com
Identification and Authentication of
Local and Distributed Systems cont…
• Distributed Systems: In distributed systems, authentication often
includes providing a password, passphrase, or other authentication
factor.
ArfanShahzad.com
Identification and Authentication of
Local and Distributed Systems cont…
• Authentication mechanisms in distributed systems involve
communication between the user's device and a remote
authentication server to verify credentials.
ArfanShahzad.com