Sunday, June 1, 2014

Authentication In Web-Based Applications



Today, information technology is developing rapidly, which allows everyone to communicate from one place to another at a distance of thousands of kilometres. The Data that is sent to it using the telecommunications transmission lines that are not necessarily assured keamananya. When data are being sent through the transmission medium is stolen or altered by the tappers and cracker for particular interests. This is an issue for the telecommunication world especially in the delivery of critical data requiring high intelligence such as information confidentiality kemeliteran, finance bank, the country's confidential information and other important information.

With regard to the control of a variety of safeguards built in hardware and operating systems that are reliable and not corrupted to preserve the integrity of program and data.

To address the problem of it's used to protect authentication data and information on the computer system, in order not to be used or modified people who aren't in the authorization. that information in a computer system can only be accessed by authorised parties and modification while maintaining the consistency and integrity of data in the system.

Authentification is the process in order to validate the user when entering the system, the name and password of the user in check through a process check directly to the list of those who were given the right to enter the system. This authorization is set up by your administrator, webmaster or site owner (holder of the highest rights or those designated in the system. For this process, each user will be on the check of the data they provide such as name, password, and other things not covered may be like hours of use, an allowed location.

Besides the authentification is also one of the many methods used to provide evidence that a particular document is received electronically actually came from the person concerned and does not turn the trick is to send a particular code via e-mail and then the owner of the email mereplay mail or entering a code that has been sent.

Authentication server serves to recognize the user that integrates into the network and contains all the information from the user, in practice usually authentification server has backupp that serves to keep if there are server problems so that networks and uninterrupted service.


In a Web application required a mechanism that can protect data from users who do not have access to it, for example, a Web site that contains photos of the family and is only accessible by members of the family. This mechanism can be implemented in the form of a login process which usually consists of three phases, namely: identification, authentication and authorization

Authentication process in principle serve as a user and a service provider's opportunity in the process of access to the resource. The user must be able to provide the needed information for the service provider is entitled to resourcenya. Being the giver of the service must be able to ensure that the parties are not entitled to will not be able to access this resource.

No comments:

Post a Comment