What Is The Difference Between Authentication And Authorization?

by on March 13, 2009 · 20 comments· LAST UPDATED February 28, 2012

in , ,

What is the difference between authentication and authorization? Why it is important to understand difference between the two? Authentication vs. Authorization -- what are they and how do they differ?

Authentication

Authentication verifies who you are. For example, you can login into your Unix server using the ssh client, or access your email server using the POP3 and SMTP client. Usually, PAM (Pluggable Authentication Modules) are used as low-level authentication schemes into a high-level application programming interface (API), which allows programs that rely on authentication to be written independently of the underlying authentication scheme.

Authorization

Authorization verifies what you are authorized to do. For example, you are allowed to login into your Unix server via ssh client, but you are not authorized to browser /data2 or any other file system. Authorization occurs after successful authentication. Authorization can be controlled at file system level or using various application level configuration options such as chroot(2).

Usually, the connection attempt must be both authenticated and authorized by the system. You can easily find out why connection attempts are either accepted or denied with the help of these two factors.

Example: Authentication And Authorization

A user called vivek is allowed to login to www.cyberciti.biz server securely using the OpenSSH ssh client/server module. In this example authentication is the mechanism whereby system running at www.cyberciti.biz may securely identify user vivek. The authentication systems provide an answers to the questions:

  • Who is the user vivek?
  • Is the user vivek really who he represents himself to be?

The server running at www.cyberciti.biz depend on some unique bit of information known only to the vivek user. It may be as simple as a password, public key authentication, or as complicated as Kerberos based system. In all cases user vivek needs some sort of secret to login into www.cyberciti.biz server via the ssh client. In order to verify the identity of a user called vivek, the authenticating system running at www.cyberciti.biz will challenges the vivek to provide his unique information (his password, or fingerprint, etc.) -- if the authenticating system can verify that the shared secret was presented correctly, the user vivek is considered authenticated.

vivek is Authenticated? What Next?

Authorization.

The Unix server running at www.cyberciti.biz determines what level of access a particular authenticated user called vivek should have. For example, vivek can compile programs using GNU gcc compilers but not allowed to upload or download files. So

  1. Is user vivek authorized to access resource called ABC?
  2. Is user vivek authorized to perform operation XYZ?
  3. Is user vivek authorized to perform operation P on resource R?
  4. Is user vivek authorized to download or upload files?
  5. Is user vivek authorized to apply patches to the Unix systems?
  6. Is user vivek authorized to make backups?

In this example Unix server used the combination of authentication and authorization to secure the system. The system ensures that user claiming to be vivek is the really user vivek and thus prevent unauthorized users from gaining access to secured resources running on the Unix server at www.cyberciti.biz.

Dealing With Large Linux / Unix Setups

Large Linux / UNIX installation equipped with central LDAP directory servers to authenticate users. A user must provide username and password against all services such as Squid proxy, Wi-Fi, SMTP, POP3 email server etc. LDAP directory allows you to obtain required information such as employee number, email address, department code, and much more. The directory provides additional data lookup and search capabilities. OpenLDAP and the Fedora Directory Server (FDS) is an LDAP (Lightweight Directory Access Protocol) servers for Linux and Unix like operating systems. Kerberos is a network authentication protocol. It is designed to provide strong authentication for client/server applications by using secret-key cryptography. A free implementation of this protocol is available from the Massachusetts Institute of Technology.

Red Hat Directory Server is an LDAP-compliant server that centralizes user identity and application information. It provides an operating system-independent, network-based registry for storing application settings, user profiles, group data, policies, and access control information.

TwitterFacebookGoogle+PDF versionFound an error/typo on this page? Help us!

{ 20 comments… read them below or add one }

1 Tata March 16, 2009 at 8:18 am

A very clear verification! Thanks!

Reply

2 pareshbhide April 10, 2009 at 6:12 am

how to setup LDAP directory servers please help

Reply

3 Naveen Kumar Jain September 28, 2011 at 7:51 am

Nice clarification.

Reply

4 Thameem November 8, 2011 at 7:10 am

It is really good explanation

Reply

5 Manas Soni December 18, 2011 at 4:54 pm

Really……. it helped me…. Thanks.

Reply

6 Harpreet Kaur January 4, 2012 at 7:24 am

Thanx…..it really very thoughtfull explanation…..

Reply

7 Mithilesh Kumar Pandey February 28, 2012 at 5:26 am

great explanation thank you !!

Reply

8 Chitra June 22, 2012 at 9:40 am

Great explanation.Thanks.

Reply

9 tesfay gebremeskel June 28, 2012 at 11:38 am

this is very nice to remember

Reply

10 Dheeraj September 12, 2012 at 5:53 am

Thank you so much for very clear difference .

Reply

11 Ravinder October 29, 2012 at 10:44 am

Thank you for providing such a clear and brief information….

Reply

12 ramesh December 14, 2012 at 3:10 pm

nice example … easy to understand..thank u ..

Reply

13 bala February 13, 2013 at 7:38 am

Clear explanation.. Thank you

Reply

14 paul maduk February 22, 2013 at 4:16 pm

thank it has help me to understand what is authentication and authorization ask a key a term that imply to security setting

Reply

15 Srikanth March 8, 2013 at 7:17 pm

Excellent

Reply

16 Rahul May 22, 2013 at 7:04 am

nice explanation.. thank u

Reply

17 Rajeesh June 7, 2013 at 6:39 am

Got exact difference , very helpful…thanks

Reply

18 chandrima October 4, 2013 at 8:06 am

Got the exact difference… thank u… :)

Reply

19 mithra January 7, 2014 at 10:22 am

it easy to understand, thank u

Reply

20 indianadvaitha April 21, 2014 at 6:00 am

Very nice explanation ….. good to remember

Reply

Leave a Comment

Tagged as: , , , , , , , , , , , , , , , , , , , , , , ,

Previous Faq:

Next Faq: