Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What is "Principal", and what is meant by "Principal
authentication"?

Answer Posted / rithi

Linda Gricius (March, 1998):

Principal authentication is the process of proving your
identity to the security enforcing components of the system
so that they can grant access to information and services
based on who you are. This applies to both human users of
the system as well as to applications.

A user or application that can authenticate itself is known
as a principal. A principal has a name that uniquely
identifies it.

For human users, the process of authenticating to the system
is informally known as "logging on". In a typical system, an
application is provided to collect information proving the
user's identity. This application is often referred to as
the "user sponsor". In order to successfully authenticate to
the system, it is important that a principal can provide
some proof that it is who it claims to be. Proof of
authentication is usually achieved by demonstrating
knowledge or possession of a "secret" known only to the
"real principal", such as a password or cryptographic key.

It is important that a successfully authenticated principal
can be given some unforgeable evidence that it has recently
authenticated, in order to prevent the principal from having
to continually re-authenticate itself to different parts of
the system. The unforgeable evidence that is returned to
authenticated principals is known as the principal's
credentials.

Is This Answer Correct ?    0 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Does corba supports asynchronous communication?

919


Can corba application be tuned for better performance?

991


Are CORBAsec implementations from the US generally subjected to export control?

2674


Explain are the different threading models that can be used within corba servers?

921


What is corba? What does it do?

997


Explain does corba supports asynchronous communication?

911


Explain the reason to implement a corba application with multi-threading?

946


What is corba good for?

986


Explain are there important forms of asynchronous communication that are not supported directly by corba?

911


Explain does corba support distributed reference counting architectures?

955


Explain can corba application have call back?

1078


Can corba application be multi-threaded?

936


Is there a set of UML diagrams for the CORBASEC Specification?

1947


What would be the most suitable ORB products when buliding a small lab for evaluating, testing and implementing security functions in a CORBA system?

2730


What is the reason to implement corba in client application application?

894