Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What is "Principal", and what is meant by "Principal
authentication"?

Answer Posted / rithi

Linda Gricius (March, 1998):

Principal authentication is the process of proving your
identity to the security enforcing components of the system
so that they can grant access to information and services
based on who you are. This applies to both human users of
the system as well as to applications.

A user or application that can authenticate itself is known
as a principal. A principal has a name that uniquely
identifies it.

For human users, the process of authenticating to the system
is informally known as "logging on". In a typical system, an
application is provided to collect information proving the
user's identity. This application is often referred to as
the "user sponsor". In order to successfully authenticate to
the system, it is important that a principal can provide
some proof that it is who it claims to be. Proof of
authentication is usually achieved by demonstrating
knowledge or possession of a "secret" known only to the
"real principal", such as a password or cryptographic key.

It is important that a successfully authenticated principal
can be given some unforgeable evidence that it has recently
authenticated, in order to prevent the principal from having
to continually re-authenticate itself to different parts of
the system. The unforgeable evidence that is returned to
authenticated principals is known as the principal's
credentials.

Is This Answer Correct ?    0 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Explain does corba define high level application architectures?

873


What is corba? What does it do?

944


Explain what is corba good for?

934


Can corba allow servers to cause client side events or notifications?

831


What is the reason to implement corba in client application application?

856


Explain the reason to implement a corba application with multi-threading?

886


Is there a set of UML diagrams for the CORBASEC Specification?

1898


How does corba support interoperability?

873


What are the reason to avoid the development of multi-threaded corba application?

945


Can corba application have call back?

1053


Does the existing Authorization Service of CORBASec scale in a "well" distributed-object environment?

2581


What is corba good for?

942


Compare CORBA security with security of other distributed object computing frameworks such as Java RMI or DCOM?

1911


Tell me can corba application be multi-threaded?

876


Explain does corba supports asynchronous communication?

863