Skip to content

Commit 5981493

Browse files
Merge pull request #54152 from ceperezb/CEPEREZB-sc900-describe-identity-concepts
add video
2 parents f26a96b + b9955bf commit 5981493

1 file changed

Lines changed: 7 additions & 3 deletions

File tree

learn-pr/wwl-sci/describe-identity-principles-concepts/includes/2-define-authentication-authorization.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,9 @@
11
Securing access to digital resources requires two distinct but related processes: confirming who is requesting access, and then deciding what that person, device, or application is allowed to do. These two processes—*authentication* and *authorization*—are fundamental to identity and access management. Understanding the difference between them is essential because every access decision in a modern organization depends on both.
22

3+
Watch the video that follows to learn about authentication and authorization.
4+
5+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=3ceacb32-c38e-4847-ae1f-ce44865f65e9]
6+
37
## Authentication
48

59
*Authentication* is the process of proving that you are who you say you are. Every time you sign in to an application, unlock your phone, or access a company system, authentication is happening. The system challenges you to provide proof of your identity, and then verifies that proof before deciding whether to allow access. Authentication answers the question: *Who are you?*
@@ -8,9 +12,9 @@ Authentication requires *credentials*—evidence that verifies your identity. A
812

913
Authentication methods are built on three categories of proof, called *authentication factors*:
1014

11-
- **Something you know**a password, PIN, or security question
12-
- **Something you have**a mobile device, hardware security key, or smart card
13-
- **Something you are**a biometric characteristic like a fingerprint or facial scan
15+
- **Something you knowa password, PIN, or security question
16+
- **Something you havea mobile device, hardware security key, or smart card
17+
- **Something you area biometric characteristic like a fingerprint or facial scan
1418

1519
Using only one factor—such as a password alone—is called *single-factor authentication*. Single-factor authentication is common but vulnerable. If that single factor is compromised—a password stolen through phishing, for example—an attacker has everything they need to impersonate the user.
1620

0 commit comments

Comments
 (0)