How does authentication work?

Hacking has been making headlines in recent years, and 2019 is no exception. There was the WhatsApp hack in which hackers were able to install surveillance technology on the phones of users who answered phone calls within the app. And let's not forget the hack on Apple's iOS which was previously seen as impenetrable.

But this year, the US Department of Defense has released a new draft of cybersecurity standards, which reinforces the rules that government contractors need to abide by to defy hacks. 

Previously, the White House has issued a new Cybersecurity National Action Plan (CNAP) to ensure the government’s security in the future. The plan features some pretty clear and straightforward proposals, including staying up to date—which turns out to be more like getting up to date—with $3.1 billion dedicated to modernizing legacy software and equipment as well as moving to two-factor authentication.

With this and our ongoing series about the Security-of-Security in mind, we thought this would be a great time to look more closely at what authentication is and how it works.  

What is authentication?

In general terms, authentication is the process of validating the identity of an entity-user, server, or client app before granting access to a protected resource. 

Client-side authentication uses username/password combinations, tokens, and other techniques while server-side authentication uses certificates to identify trusted third parties. As the name suggests, two-factor authentication, like that proposed in CNAP, refers to two forms of authentication used in combination.

While we're all familiar with how usernames and passwords work, tokens and certificates might be less familiar to you.  

What's up with tokens & certificates?


A token is a form of claims-based authentication achieved through the presentation of valid, signed information. It works the way a boarding pass does when you fly. After all, you don't just walk up to a gate and present your passport. Instead, you are authenticated based on your picture ID and ticket and then given a boarding pass. The boarding pass is the verified claim made about you by the airline.  


Cybersecurity certificateA digital certificate is an electronic document used to prove the ownership of a private key, to establish trust between its owner and an entity wishing to communicate with that owner. In addition to information about the private key and the owner, a digital certificate includes the digital signature of a signer which attests to the authenticity of the content. Ultimately, it confirms that communication is with the right entity/owner.  

One of the most common uses of certificates is for HTTPS-based websites. In this case, a web browser will validate that a web server is authentic to ensure that the website is who it claims to be and that communication between the user and the website is secure.  

Why authentication is a key component of your security infrastructure

When it comes to your physical security system, authentication is an important tool to ensure that the right person is accessing your resources. It both prevents unauthorized access and ensures that your security personnel, and not something else, is accessing your system when they log in. This means that hackers can't pretend to be a security server in order to take control of, manipulate, or copy your valuable and sensitive data.  

Once these identities have been authenticated, the next step in maintaining the security of your security system is managing who can access what part of your security system.

Check out this blog post to learn about authorization mechanisms.

Previous Video
See the big picture. Omnicast IP video management system
See the big picture. Omnicast IP video management system

Omnicast is the IP video management system of the Security Center platform that provides organizations of a...

Next Video
Customer case study: Edmonton Transit System
Customer case study: Edmonton Transit System

Edmonton Transit System uses Genetec Security Center integrated with EIZO IP Decoding Monitors for Station ...

Check out "Engage", our new podcast!

Learn more