![]() |
Authentication |
![]() |
Authentication |
So this permission check is the authorization process and once authentication and authorization is done, of course then we allow access to the resource when permitted and the source of the request is able to make use of the resources. So let's dig a little bit deeper into this question about what is authentication? We just discussed that the operating system or the trusted computing base, OS is that plus more perhaps. So the OS of the trusted computing base needs to know who is making a request for the resource that is protected. So access to that resource has to be secured. So we know that in a computer system a request actually comes from a process. This process may be running one of your services, your browser, a mail client, whatever it is. So processes making the request, but we know that processes are run on behalf of users. So a given process that is making a request must be running on behalf on a certain user. We call the user also a subject or a principal. These are the active entities that actually initiate request or cause actions. So these terms are used interchangeably, but we'll stick with user. So process runs on behalf of a user. Authentication, which is our topic, essentially is going to help us answer this question that we have, is that if a process is making a request to know who's making the request, what user is making the request, we must answer the question on whose behalf is the process running?
![]() |
Authentication |
So the requesting process makes the request by making a system call. It comes through the operating system, but on whose behalf is it making that call? To establish the user on whose behalf the process is running, of course we have to start with authentication. In the beginning, when a user comes to the system, the user is going to authenticate himself or herself. So that's how we, for example, start a login session. You login to the system, or start the session that's going to launch one or more processes that you need to run, and then in the end the session is going to be over. So when you start the login session, prior to launching the process that is making the request, of course you're going to make a claim about your identity.
No comments:
Post a Comment