What is "Principal", and what is meant by "Principal
authentication"?



What is "Principal", and what is meant by "Principal authentication"?..

Answer / rithi

Linda Gricius (March, 1998):

Principal authentication is the process of proving your
identity to the security enforcing components of the system
so that they can grant access to information and services
based on who you are. This applies to both human users of
the system as well as to applications.

A user or application that can authenticate itself is known
as a principal. A principal has a name that uniquely
identifies it.

For human users, the process of authenticating to the system
is informally known as "logging on". In a typical system, an
application is provided to collect information proving the
user's identity. This application is often referred to as
the "user sponsor". In order to successfully authenticate to
the system, it is important that a principal can provide
some proof that it is who it claims to be. Proof of
authentication is usually achieved by demonstrating
knowledge or possession of a "secret" known only to the
"real principal", such as a password or cryptographic key.

It is important that a successfully authenticated principal
can be given some unforgeable evidence that it has recently
authenticated, in order to prevent the principal from having
to continually re-authenticate itself to different parts of
the system. The unforgeable evidence that is returned to
authenticated principals is known as the principal's
credentials.

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CORBA Interview Questions

Does corba supports asynchronous communication?

0 Answers  


Explain some reason to avoid the development of multi-threaded corba application?

0 Answers  


What is corba? What does it do?

0 Answers  


Explain how does corba support interoperability?

0 Answers  


Explain what is corba good for?

0 Answers  






Is there a set of UML diagrams for the CORBASEC Specification?

0 Answers  


What are the semantic connotations for rights in CORBA rights family?

1 Answers  


What ORBs claim to have security functionality?

1 Answers  


Explain can corba application have call back?

0 Answers  


Does CORBA security guarantee that the request and reply are not tampered and not intercepted on their way between the client and the target?

1 Answers  


What are the protocols used by CSI?

1 Answers  


What are the reason to avoid the development of multi-threaded corba application?

0 Answers  


Categories