From the course: Building Your Technology Skills
Unlock this course with a free trial
Join today to access over 24,100 courses taught by industry experts.
Authentication and authorization: How they work together
From the course: Building Your Technology Skills
Authentication and authorization: How they work together
- Welcome back and thank you for joining me for another chapter of Building Your Technology Skills. I am Martin Guidry and this week we will be learning about authentication and authorization. First, let's define these terms. Authentication is the act of confirming the truth of an attribute of a single piece of data. In this case that single piece of data is the user's identity. When a user attempts to access a system and claims a certain identity, like administrator, we don't just take their word for it. Instead we require the user to prove their identity, usually by providing a password. Authorization is the function of specifying access rights to resources. Once a user's identity has been authenticated, the system will allow or prevent the user to perform certain actions. One user might be granted the capacity to only read documents, while another user might be able to read and write, and another could have access denied. Now, let's talk about what happens when one of these is…
Contents
-
-
-
Working with switches9m 33s
-
(Locked)
Working with routers10m 32s
-
(Locked)
Working with firewalls7m 9s
-
(Locked)
Authentication and authorization: How they work together7m 30s
-
(Locked)
Microsoft Certification exam tips10m 24s
-
(Locked)
Vocabulary and buzzwords8m 30s
-
(Locked)
Understanding RAID8m 56s
-
(Locked)
Overview of DNS9m 34s
-
(Locked)
Creating users10m 54s
-
(Locked)
Working with DHCP13m 30s
-
(Locked)
Exploring a troubleshooting methodology7m 34s
-
(Locked)
Understanding ping error messages6m 16s
-
(Locked)
Using the OSI network model8m 54s
-
(Locked)
Understanding Windows implicit groups5m 51s
-
(Locked)
Working with Windows Server 2016 management tools6m 34s
-
(Locked)
Nesting VMs inside of VMs10m 3s
-
(Locked)
Working with Windows 2016 Nano Server12m 28s
-
(Locked)
Best practices for naming Active Directory domains10m 1s
-
(Locked)
Understanding Wi-Fi10m 19s
-
(Locked)
Overview of IPv68m 35s
-
(Locked)
Understanding subnetting11m 31s
-
(Locked)
Understanding supernetting7m 27s
-
Compiling vs. interpreting5m 54s
-