We spent a lot of time discussing various ways to make files available over the network, including synchronizing files to multiple locations. The good news: Pat agreed to do a presentation next month about this topic.
The topic of authentication typically includes identification, authorization, access control and accounting.
- Identification is the process of identifying a user, typically by use of a login or username.
- Authentication is verifying that the user actually is who they claim to be.
- Authorization uses authentication assign permissions to a user and/or their group.
- Access control may be based on authentication or other methods, such as location or time of day.
- Accounting involves keeping a “paper trail”, typically in logs, of users and their actions.
We watched an excellent video by Christopher Rees on Access Control and Identity Management. It was an in-depth look at the topics and technologies of authentication.