<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="ko">
	<id>https://wiki.mathnt.net/index.php?action=history&amp;feed=atom&amp;title=%EC%9D%B8%EC%A6%9D</id>
	<title>인증 - 편집 역사</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.mathnt.net/index.php?action=history&amp;feed=atom&amp;title=%EC%9D%B8%EC%A6%9D"/>
	<link rel="alternate" type="text/html" href="https://wiki.mathnt.net/index.php?title=%EC%9D%B8%EC%A6%9D&amp;action=history"/>
	<updated>2026-04-04T15:15:39Z</updated>
	<subtitle>이 문서의 편집 역사</subtitle>
	<generator>MediaWiki 1.35.0</generator>
	<entry>
		<id>https://wiki.mathnt.net/index.php?title=%EC%9D%B8%EC%A6%9D&amp;diff=51426&amp;oldid=prev</id>
		<title>2021년 2월 17일 (수) 08:33에 Pythagoras0님의 편집</title>
		<link rel="alternate" type="text/html" href="https://wiki.mathnt.net/index.php?title=%EC%9D%B8%EC%A6%9D&amp;diff=51426&amp;oldid=prev"/>
		<updated>2021-02-17T08:33:01Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left diff-editfont-monospace&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;ko&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← 이전 판&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;2021년 2월 17일 (수) 08:33 판&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l97&quot; &gt;97번째 줄:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;97번째 줄:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;  &amp;lt;references /&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;  &amp;lt;references /&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== 메타데이터 ==&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==메타데이터==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt; &lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===위키데이터===&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===위키데이터===&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* ID :  [https://www.wikidata.org/wiki/Q212108 Q212108]&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* ID :  [https://www.wikidata.org/wiki/Q212108 Q212108]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;===Spacy 패턴 목록===&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* [{&amp;#039;LEMMA&amp;#039;: &amp;#039;authentication&amp;#039;}]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Pythagoras0</name></author>
	</entry>
	<entry>
		<id>https://wiki.mathnt.net/index.php?title=%EC%9D%B8%EC%A6%9D&amp;diff=47223&amp;oldid=prev</id>
		<title>Pythagoras0: /* 메타데이터 */ 새 문단</title>
		<link rel="alternate" type="text/html" href="https://wiki.mathnt.net/index.php?title=%EC%9D%B8%EC%A6%9D&amp;diff=47223&amp;oldid=prev"/>
		<updated>2020-12-26T12:36:08Z</updated>

		<summary type="html">&lt;p&gt;&lt;span dir=&quot;auto&quot;&gt;&lt;span class=&quot;autocomment&quot;&gt;메타데이터: &lt;/span&gt; 새 문단&lt;/span&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left diff-editfont-monospace&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;ko&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← 이전 판&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;2020년 12월 26일 (토) 12:36 판&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l96&quot; &gt;96번째 줄:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;96번째 줄:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===소스===&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===소스===&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;  &amp;lt;references /&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;  &amp;lt;references /&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;== 메타데이터 ==&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;===위키데이터===&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* ID :  [https://www.wikidata.org/wiki/Q212108 Q212108]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Pythagoras0</name></author>
	</entry>
	<entry>
		<id>https://wiki.mathnt.net/index.php?title=%EC%9D%B8%EC%A6%9D&amp;diff=46077&amp;oldid=prev</id>
		<title>Pythagoras0: /* 노트 */ 새 문단</title>
		<link rel="alternate" type="text/html" href="https://wiki.mathnt.net/index.php?title=%EC%9D%B8%EC%A6%9D&amp;diff=46077&amp;oldid=prev"/>
		<updated>2020-12-18T00:52:06Z</updated>

		<summary type="html">&lt;p&gt;&lt;span dir=&quot;auto&quot;&gt;&lt;span class=&quot;autocomment&quot;&gt;노트: &lt;/span&gt; 새 문단&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;새 문서&lt;/b&gt;&lt;/p&gt;&lt;div&gt;== 노트 ==&lt;br /&gt;
&lt;br /&gt;
# Authentication is the process of determining whether someone or something is, in fact, who or what it declares itself to be.&amp;lt;ref name=&amp;quot;ref_4e02&amp;quot;&amp;gt;[https://searchsecurity.techtarget.com/definition/authentication Definition from WhatIs.com]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# Many companies use authentication to validate users who log into their websites.&amp;lt;ref name=&amp;quot;ref_4e02&amp;quot; /&amp;gt;&lt;br /&gt;
# Companies also use authentication to enable remote employees to securely access their applications and networks.&amp;lt;ref name=&amp;quot;ref_4e02&amp;quot; /&amp;gt;&lt;br /&gt;
# Since this type of authentication relies on just one authentication factor, it is a type of single-factor authentication.&amp;lt;ref name=&amp;quot;ref_4e02&amp;quot; /&amp;gt;&lt;br /&gt;
# Authentication confirms that users are who they say they are.&amp;lt;ref name=&amp;quot;ref_2c85&amp;quot;&amp;gt;[https://www.okta.com/identity-101/authentication-vs-authorization/ Authentication vs. Authorization]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# Authentication is the act of validating that users are whom they claim to be.&amp;lt;ref name=&amp;quot;ref_2c85&amp;quot; /&amp;gt;&lt;br /&gt;
# In secure environments, authorization must always follow authentication.&amp;lt;ref name=&amp;quot;ref_2c85&amp;quot; /&amp;gt;&lt;br /&gt;
# The need for authentication started with computers and as technology evolved and networks became more common, it gained more importance.&amp;lt;ref name=&amp;quot;ref_99b5&amp;quot;&amp;gt;[https://link.springer.com/10.1007%2F978-1-4419-5906-5_772 Authentication]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# The oldest and simplest method to provide authentication is password login.&amp;lt;ref name=&amp;quot;ref_99b5&amp;quot; /&amp;gt;&lt;br /&gt;
# As communication systems are becoming more sophisticated, more rigorous schemes are needed to achieve authentication.&amp;lt;ref name=&amp;quot;ref_99b5&amp;quot; /&amp;gt;&lt;br /&gt;
# Multi-factor authentication (MFA) is a method of logon verification where at least two different factors of proof are required.&amp;lt;ref name=&amp;quot;ref_ae93&amp;quot;&amp;gt;[https://www.globalknowledge.com/us-en/resources/resource-library/articles/the-three-types-of-multi-factor-authentication-mfa/ The Three Types of Multi-Factor Authentication(MFA)]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# MFA is also referred to as 2FA, which stands for two-factor authentication.&amp;lt;ref name=&amp;quot;ref_ae93&amp;quot; /&amp;gt;&lt;br /&gt;
# By combining two or three factors from these three categories, a multi-factor authentication is crafted.&amp;lt;ref name=&amp;quot;ref_ae93&amp;quot; /&amp;gt;&lt;br /&gt;
# Multi-factor authentication is preferred, as it is much more difficult for an intruder to overcome.&amp;lt;ref name=&amp;quot;ref_ae93&amp;quot; /&amp;gt;&lt;br /&gt;
# At its core, Laravel&amp;#039;s authentication facilities are made up of &amp;quot;guards&amp;quot; and &amp;quot;providers&amp;quot;.&amp;lt;ref name=&amp;quot;ref_2e86&amp;quot;&amp;gt;[https://laravel.com/docs/8.x/authentication The PHP Framework For Web Artisans]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# Your application&amp;#039;s authentication configuration file is located at config/auth.php .&amp;lt;ref name=&amp;quot;ref_2e86&amp;quot; /&amp;gt;&lt;br /&gt;
# First, consider how authentication works.&amp;lt;ref name=&amp;quot;ref_2e86&amp;quot; /&amp;gt;&lt;br /&gt;
# Laravel includes built-in authentication and session services which are typically accessed via the Auth and Session facades.&amp;lt;ref name=&amp;quot;ref_2e86&amp;quot; /&amp;gt;&lt;br /&gt;
# There is a growing demand for different types of user authentication technologies for both online and in physical systems.&amp;lt;ref name=&amp;quot;ref_2b4e&amp;quot;&amp;gt;[https://www.idrnd.ai/5-authentication-methods-that-can-prevent-the-next-breach/ User Authentication Methods &amp;amp; Technologies to Prevent Breach]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# Authentication is the process of identifying users that request access to a system, network, or device.&amp;lt;ref name=&amp;quot;ref_2b4e&amp;quot; /&amp;gt;&lt;br /&gt;
# User authentication is a method that keeps unauthorized users from accessing sensitive information.&amp;lt;ref name=&amp;quot;ref_2b4e&amp;quot; /&amp;gt;&lt;br /&gt;
# Certificate-based authentication technologies identify users, machines or devices by using digital certificates.&amp;lt;ref name=&amp;quot;ref_2b4e&amp;quot; /&amp;gt;&lt;br /&gt;
# The second type of authentication is comparing the attributes of the object itself to what is known about objects of that origin.&amp;lt;ref name=&amp;quot;ref_7dfd&amp;quot;&amp;gt;[https://en.wikipedia.org/wiki/Authentication Authentication]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# Certificates can, however, also be forged, and the authentication of these poses a problem.&amp;lt;ref name=&amp;quot;ref_7dfd&amp;quot; /&amp;gt;&lt;br /&gt;
# Currency and other financial instruments commonly use this second type of authentication method.&amp;lt;ref name=&amp;quot;ref_7dfd&amp;quot; /&amp;gt;&lt;br /&gt;
# The third type of authentication relies on documentation or other external affirmations.&amp;lt;ref name=&amp;quot;ref_7dfd&amp;quot; /&amp;gt;&lt;br /&gt;
# In computing, authentication is the process of verifying the identity of a person or device.&amp;lt;ref name=&amp;quot;ref_0fed&amp;quot;&amp;gt;[https://techterms.com/definition/authentication Authentication Definition]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# While a username/password combination is a common way to authenticate your identity, many other types of authentication exist.&amp;lt;ref name=&amp;quot;ref_0fed&amp;quot; /&amp;gt;&lt;br /&gt;
# Biometrics may also be used for authentication.&amp;lt;ref name=&amp;quot;ref_0fed&amp;quot; /&amp;gt;&lt;br /&gt;
# Two-factor authentication (also &amp;quot;2FA&amp;quot;) typically requires a correct login plus another verification check.&amp;lt;ref name=&amp;quot;ref_0fed&amp;quot; /&amp;gt;&lt;br /&gt;
# Providing for multiple primary factors, and/or enforcing more than one factor during authentication, are ways that you can provide both.&amp;lt;ref name=&amp;quot;ref_6343&amp;quot;&amp;gt;[https://auth0.com/docs/architecture-scenarios/implementation/b2b/b2b-authentication Authentication]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# : SPA Example to learn about the differences between authentication, authorization, and access control.&amp;lt;ref name=&amp;quot;ref_6343&amp;quot; /&amp;gt;&lt;br /&gt;
# Understand when and why you might use each type of authentication method: first factors, second factors, and multi-factor.&amp;lt;ref name=&amp;quot;ref_6343&amp;quot; /&amp;gt;&lt;br /&gt;
# However you end up provisioning the users for your database connection, the authentication of those users is quite similar.&amp;lt;ref name=&amp;quot;ref_6343&amp;quot; /&amp;gt;&lt;br /&gt;
# Authentication is the process of recognizing a user’s identity.&amp;lt;ref name=&amp;quot;ref_e0ef&amp;quot;&amp;gt;[https://economictimes.indiatimes.com/definition/authentication What is Authentication? Definition of Authentication, Authentication Meaning]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# Authentication process can be described in two distinct phases - identification and actual authentication.&amp;lt;ref name=&amp;quot;ref_e0ef&amp;quot; /&amp;gt;&lt;br /&gt;
# Usually, authentication by a server entails the use of a user name and password.&amp;lt;ref name=&amp;quot;ref_9a0e&amp;quot;&amp;gt;[https://www.bu.edu/tech/about/security-resources/bestpractice/auth/ Understanding Authentication, Authorization, and Encryption : TechWeb : Boston University]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# Authentication does not determine what tasks the individual can do or what files the individual can see.&amp;lt;ref name=&amp;quot;ref_9a0e&amp;quot; /&amp;gt;&lt;br /&gt;
# Authentication, authorization, and encryption are used in every day life.&amp;lt;ref name=&amp;quot;ref_9a0e&amp;quot; /&amp;gt;&lt;br /&gt;
# Authentication should be used whenever you want to know exactly who is using or viewing your site.&amp;lt;ref name=&amp;quot;ref_9a0e&amp;quot; /&amp;gt;&lt;br /&gt;
# The Django authentication system handles both authentication and authorization.&amp;lt;ref name=&amp;quot;ref_4855&amp;quot;&amp;gt;[https://docs.djangoproject.com/en/3.1/topics/auth/ User authentication in Django]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# Briefly, authentication verifies a user is who they claim to be, and authorization determines what an authenticated user is allowed to do.&amp;lt;ref name=&amp;quot;ref_4855&amp;quot; /&amp;gt;&lt;br /&gt;
# Here the term authentication is used to refer to both tasks.&amp;lt;ref name=&amp;quot;ref_4855&amp;quot; /&amp;gt;&lt;br /&gt;
# Authentication is the process of verifying the identity of a client.&amp;lt;ref name=&amp;quot;ref_bb21&amp;quot;&amp;gt;[https://docs.mongodb.com/manual/core/authentication Authentication — MongoDB Manual]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# Although authentication and authorization are closely connected, authentication is distinct from authorization.&amp;lt;ref name=&amp;quot;ref_bb21&amp;quot; /&amp;gt;&lt;br /&gt;
# Authentication Mechanisms¶ MongoDB supports a number of authentication mechanisms that clients can use to verify their identity.&amp;lt;ref name=&amp;quot;ref_bb21&amp;quot; /&amp;gt;&lt;br /&gt;
# See Internal/Membership Authentication for more information.&amp;lt;ref name=&amp;quot;ref_bb21&amp;quot; /&amp;gt;&lt;br /&gt;
# It supports authentication using passwords, phone numbers, popular federated identity providers like Google, Facebook and Twitter, and more.&amp;lt;ref name=&amp;quot;ref_a899&amp;quot;&amp;gt;[https://firebase.google.com/docs/auth Firebase Authentication]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# To sign a user into your app, you first get authentication credentials from the user.&amp;lt;ref name=&amp;quot;ref_a899&amp;quot; /&amp;gt;&lt;br /&gt;
# This page provides an overview of authentication in Google Cloud&amp;#039;s platform for application developers.&amp;lt;ref name=&amp;quot;ref_3bcf&amp;quot;&amp;gt;[https://cloud.google.com/docs/authentication Authentication overview]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# Important: This page does not cover authentication for non-Google Cloud APIs, such as the Google Maps Platform APIs.&amp;lt;ref name=&amp;quot;ref_3bcf&amp;quot; /&amp;gt;&lt;br /&gt;
# Access control for Google Cloud APIs encompasses authentication, authorization, and auditing.&amp;lt;ref name=&amp;quot;ref_3bcf&amp;quot; /&amp;gt;&lt;br /&gt;
# This page focuses on authentication.&amp;lt;ref name=&amp;quot;ref_3bcf&amp;quot; /&amp;gt;&lt;br /&gt;
# When using bearer token authentication from an http client, the API server expects an Authorization header with a value of Bearer THETOKEN .&amp;lt;ref name=&amp;quot;ref_470b&amp;quot;&amp;gt;[https://kubernetes.io/docs/reference/access-authn-authz/authentication/ Authenticating]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# In a model where every request is stateless this provides a very scalable solution for authentication.&amp;lt;ref name=&amp;quot;ref_470b&amp;quot; /&amp;gt;&lt;br /&gt;
# --authentication-token-webhook-cache-ttl how long to cache authentication decisions.&amp;lt;ref name=&amp;quot;ref_470b&amp;quot; /&amp;gt;&lt;br /&gt;
# TokenReview&amp;quot; , &amp;quot;status&amp;quot;: { &amp;quot;authenticated&amp;quot;: false , # Optionally include details about why authentication failed.&amp;lt;ref name=&amp;quot;ref_470b&amp;quot; /&amp;gt;&lt;br /&gt;
# For resiliency, we recommend that you require users to register multiple authentication methods.&amp;lt;ref name=&amp;quot;ref_dbd9&amp;quot;&amp;gt;[https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-authentication-methods Authentication methods and features - Azure Active Directory]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# When you deploy features like Azure AD Multi-Factor Authentication in your organization, review the available authentication methods.&amp;lt;ref name=&amp;quot;ref_dbd9&amp;quot; /&amp;gt;&lt;br /&gt;
# The following table outlines the security considerations for the available authentication methods.&amp;lt;ref name=&amp;quot;ref_dbd9&amp;quot; /&amp;gt;&lt;br /&gt;
# To review what authentication methods are in use, see Azure AD Multi-Factor Authentication authentication method analysis with PowerShell.&amp;lt;ref name=&amp;quot;ref_dbd9&amp;quot; /&amp;gt;&lt;br /&gt;
# The way we ensure this data is secured for developers and users alike is through authentication.&amp;lt;ref name=&amp;quot;ref_5e0f&amp;quot;&amp;gt;[https://developer.twitter.com/en/docs/authentication/overview Overview]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# Most developers will not need to work with the details of authentication as Twitter client libraries already implement the protocol.&amp;lt;ref name=&amp;quot;ref_5e0f&amp;quot; /&amp;gt;&lt;br /&gt;
# Your Duo administrator may have limited which authentication methods you can use to log in.&amp;lt;ref name=&amp;quot;ref_cdaf&amp;quot;&amp;gt;[https://guide.duo.com/prompt Guide to Two-Factor Authentication · Duo Security]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# If this policy is enforced then you won&amp;#039;t be able to complete Duo authentication from your personal device.&amp;lt;ref name=&amp;quot;ref_cdaf&amp;quot; /&amp;gt;&lt;br /&gt;
# It is also helpful to remember that OAuth is about authorization in particular and not directly about authentication.&amp;lt;ref name=&amp;quot;ref_e295&amp;quot;&amp;gt;[https://www.csoonline.com/article/3216404/what-is-oauth-how-the-open-authorization-framework-works.html What is OAuth? How the open authorization framework works]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# Authorization is the process of letting a subject access resources after a successful authentication, oftentimes somewhere else.&amp;lt;ref name=&amp;quot;ref_e295&amp;quot; /&amp;gt;&lt;br /&gt;
# After authentication, the client is asked to approve the authorization transaction to the second website.&amp;lt;ref name=&amp;quot;ref_e295&amp;quot; /&amp;gt;&lt;br /&gt;
# The first website gives the access token to the second website as proof of authentication on behalf of the user.&amp;lt;ref name=&amp;quot;ref_e295&amp;quot; /&amp;gt;&lt;br /&gt;
# The value &amp;quot;auth&amp;quot; indicates authentication; the value &amp;quot;auth-int&amp;quot; indicates authentication with integrity protection; see the Franks, et al.&amp;lt;ref name=&amp;quot;ref_ca0c&amp;quot;&amp;gt;[https://tools.ietf.org/html/rfc2617 HTTP Authentication: Basic and Digest Access Authentication]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# The transactions for proxy authentication are very similar to those already described.&amp;lt;ref name=&amp;quot;ref_ca0c&amp;quot; /&amp;gt;&lt;br /&gt;
# 4 Security Considerations 4.1 Authentication of Clients using Basic Authentication Franks, et al.&amp;lt;ref name=&amp;quot;ref_ca0c&amp;quot; /&amp;gt;&lt;br /&gt;
# 4.2 Authentication of Clients using Digest Authentication Franks, et al.&amp;lt;ref name=&amp;quot;ref_ca0c&amp;quot; /&amp;gt;&lt;br /&gt;
# ”myPay’s new two-factor authentication meets the IRS standard to ensure accounts are only accessible to a verifiable account owner.&amp;lt;ref name=&amp;quot;ref_8840&amp;quot;&amp;gt;[https://www.dfas.mil/mypayinfo/2fa/ Two-Factor Authentication]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# This authentication scheme uses Django&amp;#039;s default session backend for authentication.&amp;lt;ref name=&amp;quot;ref_ee72&amp;quot;&amp;gt;[https://www.django-rest-framework.org/api-guide/authentication/ Django REST framework]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# If authentication is not attempted, return None .&amp;lt;ref name=&amp;quot;ref_ee72&amp;quot; /&amp;gt;&lt;br /&gt;
# If authentication is attempted but fails, raise a AuthenticationFailed exception.&amp;lt;ref name=&amp;quot;ref_ee72&amp;quot; /&amp;gt;&lt;br /&gt;
# JSON Web Token is a fairly new standard which can be used for token-based authentication.&amp;lt;ref name=&amp;quot;ref_ee72&amp;quot; /&amp;gt;&lt;br /&gt;
# If your app requires authentication, use Sign in with Apple to give people a simple and secure way to sign in.&amp;lt;ref name=&amp;quot;ref_5e21&amp;quot;&amp;gt;[https://developer.apple.com/design/human-interface-guidelines/ios/user-interaction/authentication/ Human Interface Guidelines]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# Explain the benefits of authentication and how to sign up for your service.&amp;lt;ref name=&amp;quot;ref_5e21&amp;quot; /&amp;gt;&lt;br /&gt;
# Face ID and Touch ID are secure, familiar authentication methods that people trust.&amp;lt;ref name=&amp;quot;ref_5e21&amp;quot; /&amp;gt;&lt;br /&gt;
# A user provides an authentication method and the associated service makes a request to the associated daemon.&amp;lt;ref name=&amp;quot;ref_311c&amp;quot;&amp;gt;[https://source.android.com/security/authentication Android Open Source Project]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# Regardless of version, biometric authentication occurs asynchronously after the request is sent.&amp;lt;ref name=&amp;quot;ref_311c&amp;quot; /&amp;gt;&lt;br /&gt;
# For example, throttling of login attempts and authentication against third parties (e.g. OAuth).&amp;lt;ref name=&amp;quot;ref_39e4&amp;quot;&amp;gt;[https://developer.mozilla.org/en-US/docs/Learn/Server-side/Django/Authentication Django Tutorial Part 8: User authentication and permissions - Learn web development]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# We&amp;#039;ll use the authentication/permissions to display lists of books that have been borrowed for both users and librarians.&amp;lt;ref name=&amp;quot;ref_39e4&amp;quot; /&amp;gt;&lt;br /&gt;
# However, in this article, we&amp;#039;re going to use Django&amp;#039;s &amp;quot;stock&amp;quot; authentication views and forms for our login and logout pages.&amp;lt;ref name=&amp;quot;ref_39e4&amp;quot; /&amp;gt;&lt;br /&gt;
# From the Authentication and Authorisation section, you can click the Users or Groups links to see their existing records.&amp;lt;ref name=&amp;quot;ref_39e4&amp;quot; /&amp;gt;&lt;br /&gt;
# A user authentication policy may be used to help ensure that only the intended audience is accessing certain assets in your organization.&amp;lt;ref name=&amp;quot;ref_8074&amp;quot;&amp;gt;[https://www.cisco.com/c/en/us/products/security/identity-services-engine/what-is-user-authentication-policy.html What Is a User Authentication Policy?]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# User authentication is a process that allows a device to verify the identify of someone who connects to a network resource.&amp;lt;ref name=&amp;quot;ref_ae66&amp;quot;&amp;gt;[https://www.watchguard.com/training/fireware/82/authent2.htm What is User Authentication?]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# Authentication is very important when you use dynamic IP addressing (DHCP) for computers on the trusted or optional network.&amp;lt;ref name=&amp;quot;ref_ae66&amp;quot; /&amp;gt;&lt;br /&gt;
# With WatchGuard® System Manager, you can configure authentication on a per policy basis.&amp;lt;ref name=&amp;quot;ref_ae66&amp;quot; /&amp;gt;&lt;br /&gt;
# Authentication is a way to ascertain that a user is who they claim to be.&amp;lt;ref name=&amp;quot;ref_a5b3&amp;quot;&amp;gt;[https://www.enisa.europa.eu/topics/csirts-in-europe/glossary/authentication-methods Authentication Methods]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# In order to provide a stronger authentication, a system can choose to present two challenges.&amp;lt;ref name=&amp;quot;ref_a5b3&amp;quot; /&amp;gt;&lt;br /&gt;
===소스===&lt;br /&gt;
 &amp;lt;references /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pythagoras0</name></author>
	</entry>
</feed>