Authentication for most of our purposes is the process a Digital Identity (Peggy) making an Assertion of Claims to a Verifier (Victor) which uses Authentication Methods to provide a Level Of Assurance by validation of the Claims.
Authentication includes Identification and is REQUIRED before you can perform Authorization.
Authentication is the function of confirming the legitimacy of a Claimant (i.e., that the Claimant is indeed the Subject which it claims to be).
Authentication is a Facet Of Building Trust.
Alice tries to send the message m, but Eve interferes with the communication channel and instead of receiving m, Bob receives a different message m`
Where:
When Alice sends the message, she computes the Message Authentication Code and sends both the message and the a authentication code, or MAC. When Bob receives the message and a (Message Authentication Code), Bob calculates a (Message Authentication Code) and compares to the value of a that Alice sent. Bob will recognize that the message is not correct.
Authentication is only a partial solution. Eve can still delete messages that Alice sends. Eve can also repeat old messages or change the message order.
Authentication in the context of Identity and Access Management, this includes:
These contexts and usages have similar operations: presentation of evidence, sometimes known as ‘authenticators’ to a verifier; verification of the evidence either as-presented or against a data repository; optional corroboration of data related to the evidence; decision; action resulting from decision.
"the real-time corroboration of a person's claimed digital Identity with an implied or notional level of trust." [2]
"The process of establishing confidence in the Digital Identity of users or information systems" (NIST.SP.800-63—2),
ISO 24745 - process of establishing an understood Level Of Confidence that a specific entity or claimed identity is genuine
There are many Authentication Methods.