What is user authentication?
Authentication is one of many cybersecurity processes a company uses to protect themselves against unauthorized access. User authentication is a means of verifying a user's identity before granting them access to an app, workstation, on-premises tool, or VPN. The user verifies their identity by providing a security token to the provider’s server or client.
Types of user authentication methods
- Two-factor authentication: A form of user authentication that comes after a user successfully signs in with a username-password combo or via single sign-on. Two-factor authentication involves methods like one-time passwords (OTP), SMS messages, mobile phone push notifications, and access token (hardware devices like YubiKey) authentication.
- Multifactor authentication (MFA): MFA is two-factor authentication with additional steps of authentication on top of it. It requires multiple steps of the authentication methods discussed above, such as inputting a password, an access token like an OTP, and then an additional factor like a hardware token (like a YubiKey).
- Biometric authentication: Biometric MFA which verifies the identity of a user based on their physical attributes. Users authenticate themselves through facial recognition or fingerprint scans.
- Contextual MFA: an advanced authentication method which verifies the identity of a user based on identifiers relative to them, including geolocation, the IP address requesting access, and time-based factors. For instance, with geolocation, if you’re company knows you live and work from Boston, MA, but someone based in San Diego is requesting access from your account, the client will deny access – as the system will recognize it as unauthorized access.
- Single sign-on (SSO): SSO is, technically, a type of authentication. We talk about MFA and SSO as separate processes because they are just that: different. SSO is a type of authentication related to a federated identity provider. It works by establishing the identity of a user – usually via an ID token like a JSON Web Token (JWT), generated by the identity provider – which is passed on to the client to approve access. Because the user is already logged in to their identity provider (the central domain), their identity is authenticated by their ID token and the application grants access.
What is authorization?
While authentication is the key that grants access to a web application or tool, the authorization process contains multiple levels of access which decide whether a user is allowed to sensitive information. Cloud storage is a common instance where authorization is implemented, where account admins can secure access requirements that limit access and allowable actions with respect to documents.
A common example is with Microsoft’s OneDrive: file admins can share documents with fellow users, but they can control:
- Who can access a document.
- Whether the document read-only or editable.
- Who in the organization can receive editing rights.
- Whether it can be shared with others.
- Whether the document can be shared in a team, with the organization, or outside the organization.
The four types of authorization
- Attribute-based Access Control (ABAC): ABAC is best described as policy-based user access authorization. It will identify a user’s permissions prior to approving authorization, often checking a user’s identity, the resource they want to access, the action they wish to complete, and the environment in which they’re requesting access. Access is granted if the user meets all permissions.
- Discretionary Access Control (DAC): DAC checks a group’s or user’s access permissions. DAC is a fast, secure way of authorizing users based on group affiliation or the identity of a user.
- Mandatory Access Control (MAC): Rather than evaluating a user’s group affiliation or identity, MAC authorizes a user at the level of their operating system. MAC defines whether further access is gained into a system to protect against serious data breaches.
- Role-based Access Control (RBAC): RBAC is a type of authorization that combines the qualities of DAC and MAC. It configures access to files and systems based on a user's role and permissions, limiting access to specific organizational roles.
In LastPass Business, access to specific vault items or shared folders can be based on user attributes like department, job role, or seniority. For instance, financial records might be accessible only to users in the finance department, while IT credentials are accessible only to IT staff.
Authentication vs. authorization
There are many authentication systems available on the market, just as there are many types of authorization available for businesses. Yet, company leaders often believe they must pick one of two options: authentication vs authorization.
However, you don’t have to choose: you can leverage a combination of authorization and authentication, allowing them to work in tandem. Authentication confirms users are who they say they are, validating a user's identity. Authorization gives those authenticated users permission to gain access to a resource. When combined, they fortify every entry point of your business, ensuring all data remains protected.
With LastPass, your business can leverage authentication and authorization policies to create a thorough identity solution.
Difference | Authentication | Authorization |
---|---|---|
Focus |
Authentication focuses on verifying identity. |
Authorization focuses on granting or denying access to resources based on verified identity and permissions. |
Sequence | Authentication occurs before authorization. |
You must be authenticated before you can be authorized to access resources. |
Questions answered |
“Who are you?” |
“What are you allowed to do?” |
Examples in LastPass |
|
|
Authenticate and authorize without passwords
Identity and access management (IAM) administrators must understand how to use everything from multifactor authentication to single sign-on to role-based access controls when developing their security infrastructure. Although this process seems complex, LastPass can help by offering a smart and simple cybersecurity solution.
- Incorporate biometric and contextual authentication factors to better protect your company.
- Provide employees, remote workers, and clients with a passwordless authentication user experience.
- Authenticate users seamlessly across all devices to maintain workflow and productivity.
- Secure every access point – from cloud and on-premises applications to VPNs and workstations – for successful authentication.
- Ensure biometric data is encrypted at the device level and remains on the user’s device for greater privacy and security.
- Offer customization to leverage numerous MFA methods for user- or group-level access control.
- Deliver a centralized list of granular policies to control access rights at individual, group, and organizational levels.
- Save time and money with a simple deployment process that doesn’t require professional services.
- Automate provisioning with user directories like Microsoft AD and Microsoft Entra ID, for simple setup and minimal management.
- Provides multiple authentication protocols and authorization plans to fit a company's size, security needs, and budget.