Overview#
Authentication Method are methods or Authentication Schemes or Authentication Mechanism used for Authentication.Authentication Method identifies the method or process in which the Authentication was performed and not the Authentication Protocol that was utilized.
Authentication Method Reference Values#
Authentication Method Reference Values shows the methods that might be used within an Authentication Process.Authentication Context Class Values shows the Authentication Process that was used.
Authentication Context Class vs Authentication Method Reference shows the differences between the two.
Authentication Methods that involve more than one Authentication Methods or Authentication Factors may be referred to as Multi-Factor Authentication.
Authentication Methods that involve Authentication Methods across more than one communication channels may be referred to as Multiple-channel Authentication
There are many technologies and methodologies implemented to provide authentication.
Authentication Context Class#
The ideas of Authentication Context Class allows the Identity Provider (IDP) to communicate to the Relying Party the Type of Authentication that was used.Specifications#
There are some Specifications that define the various different Authentication Method:- Authentication Method Reference Values
- Cardholder Verification Method
- HTTP Authentication Framework
- OpenID Connect Authentication Request
- LDAP Authentication Methods
More Information#
There might be more information for this subject on one of the following:- AWS IAM
- Access Control
- Access Token Type
- Amr
- Authentication
- Authentication Agent
- Authentication Context Class
- Authentication Context Class vs Authentication Method Reference
- Authentication Double-Hop
- Authentication Mechanism
- Authentication Method Reference
- Authentication Method Reference Values
- Authentication Schemes
- Authentication cookie
- Authenticator
- Authorization Code Flow
- Authorization Header
- Authorization Server Authentication of the End-User
- Authorization_endpoint
- Best Practices for LDAP Security
- Bind Authentication Method
- Biometric Authentication
- CRAM-MD5 SASL Mechanism
- Cardholder Verification Method
- Certificate-based Authentication
- Challenge-response
- Challenge-response Authentication Mechanism
- Client Authentication Methods
- Client-Server Exchange
- Cookie
- Credential Management
- DDA
- Delegation vs Impersonation
- Draft-behera-ldap-password-policy
- Enterprise Directory
- Extensible Authentication Protocol
- FIDO Authenticator
- FIDO Standards
- Federation
- Generic Security Service Application Program Interface
- Graded Authentication
- HTTP Authentication Framework
- Identify and Authenticate access to system components
- Identity Broker
- Identity Toolkit
- Impersonation
- Implicit Scopes
- Internet of Things
- JSON Web Token (JWT) Profile for OAuth 2.0 Client Authentication and Authorization Grants
- JWT Authentication
- Java Authentication Service Provider Interface for Containers
- Java Authentication and Authorization Service
- Kerberos
- Knowledge-Based Authentication
- LDAP Authentication
- LDAP Authentication Methods
- LDAP Result Codes
- LDAP Server Standards and Specifications
- Lightweight Directory Access Protocol (LDAP) Authentication Methods and Security Mechanisms
- M-04-04 Level of Assurance (LOA)
- Mallory
- Multi-Factor Authentication
- Mutual Authentication
- NCP Primary Authentication Protocol
- NDS Login Methods
- NMAS
- NMAS_LOGIN
- NT LAN Manager
- NTLM SSP
- Novell Modular Authentication Service
- OAuth 2.0 Mutual TLS Client Authentication and Certificate Bound Access Tokens
- OAuth Scope Example
- OAuth Token Endpoint Authentication Methods
- OpenID Provider Authentication Policy Extension
- Pass-the-ticket
- Password
- Password Authentication
- Password Strength
- Password-authenticated Key Agreement
- Password-based
- Passwordless Authentication
- Physiological Characteristics
- Pluggable Authentication Modules
- Privileged Scope
- Proxy-Authenticate
- RFC 2617
- Risk-Based Authentication
- SASL
- SASL Mechanisms
- SCIM Discovery Mechanisms
- SCIM ServiceProviderConfig endpoint
- Salted Challenge Response Authentication Mechanism
- Secure Remote Password Protocol
- Security-constraint
- Server Authentication Module
- Server Message Block
- Session Management
- Simple Authentication
- Simple and Protected GSSAPI Negotiation Mechanism
- Single Sign-On Scenarios
- Social Login
- Spmdclnt
- Strength of Function for Authenticators
- TGS Exchange
- The SRP Authentication and Key Exchange System
- Touch ID
- Trust Elevation
- Universal Authentication Framework
- Universal Password
- Verifier
- WWW-Authenticate
- Web Blog_blogentry_040417_1
- Web Blog_blogentry_160718_1
- Web Blog_blogentry_180317_1
- Web Blog_blogentry_251015_1
- What To Do About Passwords
- Windows Authentication Package
- Windows Client Authentication Architecture
- Windows Logon Types