Authentication
Authentication is the process of proving that a user, application, or device is who or what it claims to be, typically before granting access to a system or resource. It is distinct from identification, which merely states an identity without proving it. Common examples include entering a password, using a fingerprint scanner, or confirming a one-time code sent to your phone.
Authentication is the process of verifying the claimed identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system. It relies on one or more authentication factors, commonly categorized as something you know (e.g., passwords, PINs), something you have (e.g., hardware tokens, cryptographic keys), and something you are (e.g., biometrics). Multi-factor authentication (MFA) combines two or more of these factor categories to increase assurance. Authentication should be distinguished from authorization, which determines what an authenticated entity is permitted to do. In application security, robust authentication mechanisms are foundational controls, and weaknesses in authentication (such as credential stuffing vulnerabilities, session fixation, or insufficient credential complexity enforcement) represent a significant category of exploitable flaws.
Why it matters
Authentication is a foundational security control because it establishes trust at the boundary of every system interaction. Without reliable authentication, authorization controls become meaningless since there is no verified identity upon which to base access decisions. Weaknesses in authentication, such as credential stuffing vulnerabilities, session fixation, or insufficient credential complexity enforcement, represent a significant and frequently exploited category of application security flaws. Compromised authentication can lead to unauthorized access to sensitive data, privilege escalation, and lateral movement within systems.
The importance of authentication extends beyond individual user logins. In modern architectures, applications, services, and devices all require identity verification when communicating with each other. A failure in any of these authentication points can expose an entire system to compromise. The 2012 Dropbox breach, for example, stemmed from a reused employee password, illustrating how a single authentication weakness can cascade into the exposure of tens of millions of user credentials. Robust authentication practices, including multi-factor authentication and the enforcement of strong credential policies, are among the most effective controls organizations can adopt to reduce their attack surface.
Who it's relevant to
Inside AuthN
Common questions
Answers to the questions practitioners most commonly ask about AuthN.