25 Sep 2022

222

Authentication and Authorization of Non-Windows Devices

Format: APA

Academic level: College

Paper type: Research Paper

Words: 293

Pages: 1

Downloads: 0

The connection attempt for any operating system must always have authorization and authentication of credentials. However, without this aspect, the process would fail or be denied. Authentication entails the process in which the verification of the credentials is made during the attempt of any connection to a device. Further, the credentials of the operating system are sent from a remote access point to the remote server for authentication of the protocol. On the other hand, authorization entails the process of verifying the allowed attempt of connection. Additionally, it takes place after successful authentication. Therefore, it is imperative to understand the method of authorization and authentication of the non-window operating systems. 

The remote access of a server is always configured for remote authentication on the dial-in user service (RADIUS). Similarly, the attempt of connecting credentials is passed through the RADIUS servers to ensure authorization and authentication process is successful (Chadda, Samuels, Decasper, Dittia, & Ankam, 2014). Notably, the authorization process for non-windows systems begins with the identification of the user. The username is given as the user logs on to the system. Specifically, the user is also noted in the internal network as a user identification number(UID). Primarily this entails numeric value which is selected by the system administrator when the account is created (Authentication vs. Authorization, 2018). After that, the mapping of the username to UID is stored in a file and is often managed centrally by network information system. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Nonetheless, the authentication of non-windows devices is done after identification of username given when the user logs on to the system. The password is requested to ensure the process of authentication is determined accordingly. Thus, the password entered by the user is encrypted by the application of modified algorithm by comparing it with the stored one in the database (Hedbom, Lindskog, Axelsson, & Jonsson, 1998).when they matched and proven legitimate, the system becomes readable for everyone in the system for the sensitivity of any attack. 

References 

Chadda, S., Samuels, A., Decasper, D., Dittia, Z., & Ankam, S. (2014).  U.S. Patent No. 8,908,700 . Washington, DC: U.S. Patent and Trademark Office. 

Authentication vs. Authorization. (2018). Retrieved from https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/ff687657(v=ws.10) 

Hedbom, H., Lindskog, S., Axelsson, S., & Jonsson, E. (1998).  A Comparison of the Security of Windows NT and UNIX . Högskolan i Karlstad. 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 15). Authentication and Authorization of Non-Windows Devices.
https://studybounty.com/authentication-and-authorization-of-non-windows-devices-research-paper

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Security Implication of the Internet of Things

The Internet of Things (IoT) can be described as s system of interconnected devices that have the ability to transfer information over a computer network without the need of human-to-computer or human-to-human...

Words: 892

Pages: 3

Views: 96

Modern Day Attacks Against Firewalls and VPNs

Introduction The need to have an enhanced security of the computer connectivity happens to be one of the reasons that attract companies and organizations towards wide usage of VPNs. Several simple techniques...

Words: 2025

Pages: 7

Views: 134

How to Deploy and Administer Windows Server 2012

Securing a reliable, and expandable configuration for a company is important to build a strong network. The new and enhanced features of the Windows Server 2012 can be used to implement the network. In this...

Words: 1673

Pages: 6

Views: 88

Deployment Model in Cloud Computing

Deployment model is a representation of a cloud environment primarily distinguished by parameters such as accessibility, proprietorship, and storage size. The National Institute of Standards and Technology gives the...

Words: 254

Pages: 1

Views: 82

How to Use Web Search Engines for Business Research

The advancement of technology has made it possible for many people around the world to have easy access to information whenever they want. The development of the Wide World Web-enabled different kinds of information...

Words: 773

Pages: 3

Views: 87

Distributed Database Management System (DDBMS)

Introduction Data management has been a headache to many technology enthusiasts for quite a long period of time. They have successfully managed to logically collect interrelated data and share it. If the data is...

Words: 799

Pages: 3

Views: 128

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration