AuthN
AuthN, short for authentication, is the process of verifying the claimed identity of a user, device, or other entity attempting to access a system. It serves as the initial gate in access control and is distinct from authorization (AuthZ), which determines what actions an authenticated entity is allowed to perform.
In practice, AuthN relies on evidence presented by the entity—credentials or other factors. Typical methods include
Standards and protocols commonly used with AuthN include SAML 2.0 for federated identity, OAuth 2.0 and OpenID
Authentication flows vary from simple single-factor logins to multi-factor arrangements. Organizations may employ step-up or adaptive
Security and governance considerations are central to AuthN. Passwords are prone to reuse and phishing, so