ALLInterview.com :: Home Page            
 Advertise your Business Here     
Browse  |   Placement Papers  |   Company  |   Code Snippets  |   Certifications  |   Visa Questions
Post Question  |   Post Answer  |   My Panel  |   Search  |   Articles  |   Topics  |   ERRORS new
   Refer this Site  Refer This Site to Your Friends  Site Map  Bookmark this Site  Set it as your HomePage  Contact Us     Login  |  Sign Up                      
Google
   
 
Categories >> Software >> Microsoft Related >> Dot Net >> Dot Net Remoting
 
 


 

 
 Dot Net Framework interview questions  Dot Net Framework Interview Questions (204)
 Dot Net Remoting interview questions  Dot Net Remoting Interview Questions (75)
 Dot Net WindowsForms interview questions  Dot Net WindowsForms Interview Questions (83)
 Dot Net General interview questions  Dot Net General Interview Questions (321)
 Dot Net AllOther interview questions  Dot Net AllOther Interview Questions (178)
Question
What is the difference between authentication and
authorization  
?
 Question Submitted By :: Dot-Net-Remoting
I also faced this Question!!     Answer Posted By  
 
Answer
# 1
Authentication
An authentication system is how you identify yourself to
the computer. The goal behind an authentication system is
to verify that the user is actually who they say they are.
There are many ways of authenticating a user.Like
Password based authentication
Device based authentication
Biometric Authentication

Authorization
Once the system knows who the user is through
authentication, authorization is how the system decides
what the user can do.
A good example of this is using group permissions or the
difference between a normal user and the superuser on a
unix system.
 
Is This Answer Correct ?    161 Yes 10 No
Suresh Kumar Jetty
 
Answer
# 2
Authentication is to check about user.Through authentication
check the user exist or not .
It check that user exist or not.

Authorization check that authentic user have proper
permission or not to access that particular page or
services.
 
Is This Answer Correct ?    79 Yes 17 No
Ashish Nigam
 
 
 
Answer
# 3
An authentication system is how you identify yourself to
the computer. The goal behind an authentication system is
to verify that the user is actually who they say they are.

There are many ways of authenticating a user. Any
combination of the following are good examples.


Password based authentication
Requires the user to know some predetermined quantity
(their password).

Advantages: Easy to impliemnt, requires no special
equipemnt.

Disadvantages: Easy to forget password. User can tell
another user their password. Password can be written down.
Password can be reused.

Device based authentication
Requires the user to posses some item such as a key, mag
strip, card, s/key device, etc.

Advantages: Difficult to copy. Cannot forget password. If
used with a PIN is near useless if stolen.

Disadvantages: Must have device to use service so the user
might forget it at home. Easy target for theft. Still
doesn't actually actively identify the user.

Biometric Authentication
My voice is my passport. Verify me. This is from the movie
sneakers and demonstrates one type of biometric
authentication device. It identifies some physical
charactistic of the user that cannot be seperated from
their body.

Retina Scanners:
Advantages: Accurately identifies the user when it works.

Disadvantages: New technology that is still evolving. Not
perfect yet.

Hand Scanners:
Advantages: Difficult to seperate from the user. Accurately
identifies the user.

Disadvantages: Getting your hand stolen to break into a
vault sucks a lot more than getting your ID card stolen.

Authorization
Once the system knows who the user is through
authentication, authorization is how the system decides
what the user can do.

A good example of this is using group permissions or the
difference between a normal user and the superuser on a
unix system.

There are other more compicated ACL (Access Control Lists)
available to decide what a user can do and how they can do
it. Most unix systems don't impliment this very well (if at
all.)
 
Is This Answer Correct ?    34 Yes 6 No
Manoj Kumar
 
Answer
# 4
Authentication: verifying the user.
Authorised: premission to access.
 
Is This Answer Correct ?    35 Yes 11 No
Maskedmenace
 
Answer
# 5
in Easy terms Authentication means system understands that both the provided password and username are correct at login , and particulate user is Authenticated to move further.

Authorization:: When above said process is Successfully Completed , now system decides what are the permissions has to be given to this particular user, either Read / Write / Rear and Write (ie.Both)
 
Is This Answer Correct ?    18 Yes 6 No
Akbar Hussain
 
Answer
# 6
In simple terms Authentication means to identiy a
particular user by computer, and it can be done by some of
like password,device based authentication technologies.

Where as once authentication process completed and the
computer finds the valid user then Is that particular user
had privilage to access particular resources like printers
etc or not comes under authorization.
 
Is This Answer Correct ?    14 Yes 13 No
Madhusudhan Hareesh
 
Answer
# 7
An authentication system is how you identify yourself to
the computer. The goal behind an authentication system is
to verify that the user is actually who they say they are.

There are many ways of authenticating a user. Any
combination of the following are good examples.


Password based authentication
Requires the user to know some predetermined quantity
(their password).

Advantages: Easy to impliemnt, requires no special
equipemnt.

Disadvantages: Easy to forget password. User can tell
another user their password. Password can be written down.
Password can be reused.

Device based authentication
Requires the user to posses some item such as a key, mag
strip, card, s/key device, etc.

Advantages: Difficult to copy. Cannot forget password. If
used with a PIN is near useless if stolen.

Disadvantages: Must have device to use service so the user
might forget it at home. Easy target for theft. Still
doesn't actually actively identify the user.

Biometric Authentication
My voice is my passport. Verify me. This is from the movie
sneakers and demonstrates one type of biometric
authentication device. It identifies some physical
charactistic of the user that cannot be seperated from
their body.

Authorization
Once the system knows who the user is through
authentication, authorization is how the system decides
what the user can do.

A good example of this is using group permissions or the
difference between a normal user and the superuser on a
unix system.
 
Is This Answer Correct ?    5 Yes 10 No
Rahul
 

 
 
 
Other Dot Net Remoting Interview Questions
 
  Question Asked @ Answers
 
About remoting and web services. Difference between them? Microsoft 6
What is assembly ? DELL 4
Threading Types ? DELL 3
How can you tell the application to look for assemblies at the locations other than its own install?   1
What is ODP.NET? Microsoft 1
What is a Windows process?   1
How can you create a strong name for a .NET assembly?   2
What is an assembly and what does manifest consists ? TCS 3
About .NET Remoting and types of remoting ? MMTS 2
What is a process ? TCS 6
What is strong name and what is the purpose of strong name ? TCS 8
Give the Hierarchial description of remoting? Satyam 1
 
For more Dot Net Remoting Interview Questions Click Here 
 
 
 
 
 


   
Copyright Policy  |  Terms of Service  |  Articles  |  Site Map  |  RSS Site Map  |  Contact Us
   
Copyright 2013  ALLInterview.com.  All Rights Reserved.

ALLInterview.com   ::  KalAajKal.com