Example
An integration transaction sends a partner an authentication code encrypted with the public key in the partner's digital certificate. When the partner sends back the correct code, the partner is considered authenticated. Any data sent over a properly authenticated and secured channel is considered authenticated. It is also a good practice to confirm data integrity at the same time. This is typically done by matching checksums. If data is somehow corrupted in transit, it can't be considered authenticated.Overview: Data Authentication | ||
Type | ||
Definition | The process of confirming that data matches that of an authenticated source. | |
Related Concepts |