Authentication
User identity most often established through passwords.
Passwords can be considered as a special. case of either keys or capabilities.
Passwords must be kept secret.
Previous slide
Next slide
Back to first slide
View graphic version