TechTalkTuesday – Authentication

Welcome to #TechTalkTuesday – where tech terms are defined, explained, and no longer a mystery.

Today we’re delving into authentication. Authentication is a term we use significantly here at ZenKey. We are proud of our authentication solution and the ways in which it can be used to unlock the door to your digital platform.

What is your understanding of authentication? Do you know how authentication can play a role in your online security?

Just what is authentication? Simply put, authentication is the step taken to validate that a user is who they claim that they are. Authentication should be the first step taken in a security process.

Some of the factors that can be considered during the authentication process include the following.

  • Username and password. This is the most frequently used authentication method. If the user provides the correct username and password combination, the system will automatically assume that the identity is valid. Access will be granted.
  • One-time password (OTP) or pin. OTPs are a string of numbers or characters that serve to authenticate a user for single login or transaction. They can offer an extra authentication layer for unverified users to pass prior to gaining access to system or account.
  • A fingerprint, eye scan, or other biometric factors can be used to grant access.
  • Third-party authentication apps that general a security code in order to offer system access.

In some situations, systems will be set up to require users to successfully verify more than one factor before they are granted access. Referred to as multi-factor authentication (MFA), this requirement is seen deployed in an effort to boost online security beyond what a username and password alone can accomplish.

Join us next week for TechTalkTuesday when we delve into authorization, with a follow-up blog covering both authentication and authorization and how they relate to one another.