Questions tagged [authentication]

Authentication is the process of providing a proof of identity or verifying identity.

Authentication is the process of providing a proof of identity or verifying identity. This might involve confirming the identity of a person or software program, tracing the origins of an artifact, or ensuring that a product is what its packaging and labeling claims to be. Authentication is different than Authorization, which is the step of allowing access to a resource. Authentication and authorization usually happen together to verify identity and then allow access.

The first type of authentication is accepting proof of identity given by a credible person who has evidence on the said identity, or on the originator and the object under assessment as the originator's artifact respectively.

The second type of authentication is comparing the attributes of the object itself to what is known about objects of that origin. For example, an art expert might look for similarities in the style of painting, check the location and form of a signature, or compare the object to an old photograph.

The third type of authentication relies on documentation or other external affirmations.

Factors and identity

The ways in which someone may be authenticated fall into three categories, based on what is known as the factors of authentication: something the user knows, something the user has, and something the user is. Each authentication factor covers a range of elements used to authenticate or verify a person's identity prior to being granted access, approving a transaction request, signing a document or other work product, granting authority to others, and establishing a chain of authority.

74922 questions
235
votes
6 answers

Security of REST authentication schemes

Background: I'm designing the authentication scheme for a REST web service. This doesn't "really" need to be secure (it's more of a personal project) but I want to make it as secure as possible as an exercise/learning experience. I don't want to use…
dF.
  • 74,139
  • 30
  • 130
  • 136
231
votes
6 answers

JWT vs cookies for token-based authentication

I read some posts about "JWT vs Cookie" but they only made me more confused... I want some clarification, when people talking about "token-based authentication vs cookies", cookies here merely refer to session cookies? My understanding is that…
watashiSHUN
  • 9,684
  • 4
  • 36
  • 44
217
votes
11 answers

Passport.js - Error: failed to serialize user into session

I got a problem with the Passport.js module and Express.js. This is my code and I just want to use a hardcoded login for the first try. I always get the message: I searched a lot and found some posts in stackoverflow but I didnt get the…
user2244925
  • 2,314
  • 3
  • 14
  • 11
214
votes
11 answers

Checking if a SQL Server login already exists

I need to check if a specific login already exists on the SQL Server, and if it doesn't, then I need to add it. I have found the following code to actually add the login to the database, but I want to wrap this in an IF statement (somehow) to check…
Brett Rigby
  • 6,101
  • 10
  • 46
  • 76
213
votes
3 answers

How Spring Security Filter Chain works

I realize that Spring security build on chain of filters, which will intercept the request, detect (absence of) authentication, redirect to authentication entry point or pass the request to authorization service, and eventually let the request…
Tuomas Toivonen
  • 21,690
  • 47
  • 129
  • 225
213
votes
4 answers

SQL Server 2008 can't login with newly created user

I'm using using Windows Vista and I'm having trouble logging in with a newly created user. I open SQL Server Management Studio. I create a new Login by right-clicking on Security->Logins. Check: SQL Server Authentication Login name:…
Travis Heseman
  • 11,359
  • 8
  • 37
  • 46
210
votes
13 answers

How to center a component in Material UI and make it responsive?

I don't quite understand the Material UI grid system. If I want to use a form component for login, what is the easiest way to center it on the screen on all devices (mobile and desktop)?
zorro
  • 2,305
  • 2
  • 11
  • 14
206
votes
7 answers

How are people managing authentication in Go?

For those building RESTful APIs and JS front-end apps in Go, how are you managing authentication? Are you using any particular libraries or techniques? I'm surprised to find so little discussion about this. I keep in mind answers like the following,…
SexxLuthor
  • 4,460
  • 3
  • 18
  • 25
198
votes
4 answers

What's a redirect URI? how does it apply to iOS app for OAuth2.0?

Beginner programmer here, please pardon ignorance & explanations will be really nice :) I've tried to read the tutorials for a certain OAuth 2.0 service, but I don't understand this redirect URI... in my particular context, let's say I'm trying to…
David T.
  • 22,301
  • 23
  • 71
  • 123
196
votes
8 answers

Git Clone from GitHub over https with two-factor authentication

I recently began using two-factor authentication on GitHub, and I am now unable to use git over https on private repos in the usual way: peter@computer:~$ git clone https://github.com/[...]/MyPrivateRepo Cloning into 'MyPrivateRepo'... Username for…
peter-b
  • 4,073
  • 6
  • 31
  • 43
193
votes
5 answers

Creating an API for mobile applications - Authentication and Authorization

Overview I'm looking to create a (REST) API for my application. The initial/primary purpose will be for consumption by mobile apps (iPhone, Android, Symbian, etc). I've been looking into different mechanisms for authentication and authorization…
jsuggs
  • 2,632
  • 3
  • 19
  • 17
191
votes
4 answers

Adding ASP.NET MVC5 Identity Authentication to an existing project

I have seen lots of similar pages on the web, but most of them use a new project instead of an existing one, or don't have the necessary features. So, I have an existing MVC 5 project and want to integrate ASP.NET MVC5 Identity with log in, email…
Jack
  • 1
  • 21
  • 118
  • 236
191
votes
10 answers

MySQL root access from all hosts

I've installed MySQL server on a remote Ubuntu machine. The root user is defined in the mysql.user table this way: mysql> SELECT host, user, password FROM user WHERE user =…
lorenzo-s
  • 16,603
  • 15
  • 54
  • 86
187
votes
10 answers

Amazon S3 direct file upload from client browser - private key disclosure

I'm implementing a direct file upload from client machine to Amazon S3 via REST API using only JavaScript, without any server-side code. All works fine but one thing is worrying me... When I send a request to Amazon S3 REST API, I need to sign the…
Olegas
  • 10,349
  • 8
  • 51
  • 72
185
votes
4 answers

Git - How to use .netrc file on Windows to save user and password

Is it possible to use a .netrc file on Windows when I'm using Git to clone a remote repository with HTTP and user - password?
Bernd Klaus
  • 1,915
  • 3
  • 13
  • 5