{"componentChunkName":"component---src-pages-markdown-remark-fields-slug-js","path":"/identity/what-is-authentication/","result":{"data":{"markdownRemark":{"id":"73801a8f-0c87-50c8-9791-b98c382f3319","excerpt":"A Beginner's Guide to Authentication We all have witnessed a spike in online user platforms from the past few years, catering to every service you can think of…","html":"<h1 id=\"a-beginners-guide-to-authentication\" style=\"position:relative;\"><a href=\"#a-beginners-guide-to-authentication\" aria-label=\"a beginners guide to authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Beginner's Guide to Authentication</h1>\n<p>We all have witnessed a spike in online user platforms from the past few years, catering to every service you can think of. This is because making things digitally available has eased the consumer’s struggle. </p>\n<p>For example, now you can order your food just by logging in to a food catering website. Easy, right? Everything is now just a click away. Your banking transactions, business, things of entertainment like movies and Netflix. Everything!</p>\n<p>But with all these services comes a massive task for the service providers, and that task is to verify that you are their actual consumer and not an imposter trying to steal data. So, to verify users, businesses use a technical approach called authentication. </p>\n<h2 id=\"what-is-authentication\" style=\"position:relative;\"><a href=\"#what-is-authentication\" aria-label=\"what is authentication permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is Authentication</h2>\n<p>Authentication is the process of uniquely identifying an individual via a set of credentials. In the digital world, authentication is termed as verifying a person's identity or an electronic device.</p>\n<p>Authentication becomes necessary because it increases the security of consumer's data. Without verifying or authenticating oneself, no one can enter the website and access your data. The most popular example of authentication is entering into a system using login credentials. </p>\n<p>With the huge increase in the number of digital platforms, the demand for various authentication processes has been increasing for both online and physical systems. </p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 56.30769230769231%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"What is Authentication\"\n        title=\"What is Authentication\"\n        src=\"/static/5778d8e85f4f308646737b7df0159e2b/212bf/authentication.jpg\"\n        srcset=\"/static/5778d8e85f4f308646737b7df0159e2b/6aca1/authentication.jpg 650w,\n/static/5778d8e85f4f308646737b7df0159e2b/212bf/authentication.jpg 768w,\n/static/5778d8e85f4f308646737b7df0159e2b/b17f8/authentication.jpg 1600w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></p>\n<h2 id=\"how-authentication-is-brought-into-use\" style=\"position:relative;\"><a href=\"#how-authentication-is-brought-into-use\" aria-label=\"how authentication is brought into use permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Authentication Is Brought Into Use</h2>\n<p>Authentication can be divided into two major categories.</p>\n<ol>\n<li>Human to machine authentication</li>\n<li>Machine to machine authentication</li>\n</ol>\n<p>In any of the above types of authentication, there is a requirement for certain credentials. In human verification, we have a user ID and password set by the consumer, while for machines, we have certificates and IP addresses, along with other information. </p>\n<p>Generally, a consumer has to select or create a User ID and corresponding password for that unique ID that the system will use to verify user credibility. Many companies make use of authentication to verify the users who try to login into their digital platforms. But if consumers' data falls into cybercriminals' hands, it can cause some severe problems. Hence companies ensure using high-level security measures, which involves using another advanced authentication level such as <a href=\"https://www.loginradius.com/resource/ebook/buyers-guide-to-multi-factor-authentication/\">multi-factor authentication</a>. </p>\n<h2 id=\"how-does-authentication-work\" style=\"position:relative;\"><a href=\"#how-does-authentication-work\" aria-label=\"how does authentication work permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Does Authentication Work</h2>\n<p>As mentioned above, the consumer needs to create a unique user ID and password at registration. The system will use this data to validate the consumer whenever they attempt to log in next time. These credentials will be stored in the companies database or on the local operating system through an authentication server.</p>\n<p>Now when the consumer enters these credentials on login, the entered credentials are matched with the ones stored in the database. If the credentials match, the consumer is given access into the portal; else access is denied. </p>\n<p>Now the question comes how to create such credentials which can be remembered easily?</p>\n<p>There are a few ways that can help you in simplifying your validation. These ways are:</p>\n<ol>\n<li><strong>Things you know (knowledge)</strong>: This method involves questions that only you can answer. What is your mother's maiden name? Or what is your child's name? The purpose is to verify your identity via these questions because you are the only one who can answer these.</li>\n<li><strong>Things you have(possession)</strong>: This method involves verification from the things you have or possess, such as a mobile phone. A verification notification will be sent to your phone screen, and when you allow it from that screen only, you will be able to log in to your account. </li>\n<li><strong>Things you are(inheritance)</strong>: A fingerprint or retinal scan commonly verifies this factor. This method's purpose is clear; only you can have your fingerprint and no one else. </li>\n</ol>\n<h2 id=\"how-authentication-is-useful-for-business\" style=\"position:relative;\"><a href=\"#how-authentication-is-useful-for-business\" aria-label=\"how authentication is useful for business permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Authentication Is Useful for Business</h2>\n<p>With data breaches continually on the rise in headlines and consumers becoming more personally involved in their information security, most businesses already understand the importance of cybersecurity. </p>\n<p>Even small businesses have some sort of authentication for their systems. This is done by asking the employees to enter a single sign-on password to access company data. This way, businesses ensure that sensitive information is accessed only by authorized individuals. </p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>In this article we have talked about the basics of authentication and how it is used. We have also covered <a href=\"https://www.loginradius.com/blog/engineering/webauthn-authentication-application/\">how authentication works</a> and what are the benefits to the organizations.</p>\n<p>Cheers!</p>\n<p><a href=\"https://www.loginradius.com/book-a-demo/\"><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 768px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 30.307692307692307%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"book-a-demo-loginradius\"\n        title=\"book-a-demo-loginradius\"\n        src=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png\"\n        srcset=\"/static/fcc4c4b5dc38cc4528f99d09480f4eb2/a6d36/book-a-demo-loginradius.png 650w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/e5715/book-a-demo-loginradius.png 768w,\n/static/fcc4c4b5dc38cc4528f99d09480f4eb2/63ff0/book-a-demo-loginradius.png 2887w\"\n        sizes=\"(max-width: 768px) 100vw, 768px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n      />\n    </span></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","headings":[{"value":"A Beginner's Guide to Authentication","depth":1},{"value":"What is Authentication","depth":2},{"value":"How Authentication Is Brought Into Use","depth":2},{"value":"How Does Authentication Work","depth":2},{"value":"How Authentication Is Useful for Business","depth":2},{"value":"Conclusion","depth":2}],"fields":{"slug":"/identity/what-is-authentication/"},"frontmatter":{"metatitle":"What is Authentication?","metadescription":"Learn the basics of authentication and how it is used. We have also covered how authentication works and what are the benefits to the organizations.","description":"Authentication is the process of uniquely identifying an individual via a set of credentials. In the digital world, authentication is termed as verifying a person's identity or an electronic device. Authentication becomes necessary because it increases the security of consumer's data.","title":"What is Authentication","canonical":null,"date":"March 29, 2021","updated_date":null,"tags":["authentication","data security","mfa"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5873015873015872,"src":"/static/6d170d83a7074847494831a6df861d3c/d3746/cover-auth.jpg","srcSet":"/static/6d170d83a7074847494831a6df861d3c/3dcee/cover-auth.jpg 200w,\n/static/6d170d83a7074847494831a6df861d3c/ae6ae/cover-auth.jpg 400w,\n/static/6d170d83a7074847494831a6df861d3c/d3746/cover-auth.jpg 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Manish Tiwari","github":null,"bio":"Manish Tiwari is working as a Technical Support Manager at LoginRadius. He is a dynamic & versatile professional in IT service management, technical support, maintenance, and troubleshooting. He loves playing cricket, watching movies, and cooking in his free time.","avatar":null}}}},"pageContext":{"id":"73801a8f-0c87-50c8-9791-b98c382f3319","fields__slug":"/identity/what-is-authentication/","__params":{"fields__slug":"identity"}}},"staticQueryHashes":["1171199041","1384082988","1711371485","1753898100","2100481360","229320306","23180105","528864852"]}