A-Z Popular New Security Search »
Information Security
 
Related Guides

3 Examples of Mutual Authentication

 , updated on
Mutual authentication is when two parties verify each others identity. It can occur user-machine or machine-machine. The following are illustrative examples.

Website

A website displays a personal photo configured by the user on the logon page. The website asks the user to confirm that the photo is correct before proceeding to request a password. In this way, the user can confirm that they are on the right site before inputting confidential information.

Business-to-Business

It is common for business-to-business interfaces to perform mutual authentication before executing transactions. A variety of technologies and standards exist for business-to-business authentication based on technologies such as public key infrastructure and digital certificates.

Development

A developer connects to servers using a secure shell program. The program warns the developer when they connect to a new server and asks that they confirm the IP. The secure shell may store the signature of the server and not warn when the developer connects the second time. If anything changes, the program warns the developer at connection time. The developer authenticates with each server by logging on with a strong password.
Overview: Mutual Authentication
Type
Definition
A user-machine or machine-machine process of verifying the identity of both sides in an interaction.
Value
Historically, user-machine authentication was often focused on verifying the user. This lead to problems whereby sites or applications were forged. Mutual authentication makes users aware of their role in confirming they are in the right place before providing confidential information.
Related Concepts

Information Security

This is the complete list of articles we have written about information security.
Audit Trail
Canary Trap
Confidential Information
Critical Infrastructure
Cryptographic Keys
Cryptographic Salt
Cryptography
Cybersecurity Risk
Data Breach
Data Remanence
Data Room
Data Security
Deep Magic
Defense In Depth
Degaussing
Digital Identity
Failure Of Imagination
Geofencing
Hardening
Honeypot
IoT Security
Key Stretching
Network Security
Non-repudiation
Nonce
Operations Security
Overlay Network
Password Entropy
Password Fatigue
Proof Of Work
Sandbox
Secure Code Review
Security As A Service
Security Controls
Zero-day
More ...
If you enjoyed this page, please consider bookmarking Simplicable.
 

Security vs Privacy

The relationship between security and privacy.

Hardening

An overview of technology hardening.

Deep Magic

An overview of deep magic, a technology term.

Defense In Depth

An overview of defense In depth.

Encryption Examples

A definition of encryption with examples.

Canary Trap

A definition of canary trap with an example.

Honeypot

A definition of honeypot with examples.

Security Through Obscurity

A definition of security through obscurity with an example.

Tokens

A definition of token with examples.

Backdoor

A definition of backdoor with examples.

Data Backup

Several data backup techniques compared.

Sandbox Definition

An overview of sandboxes. An information security technique.

Strong Password

A few examples of what makes a password strong or weak.

Zero-day Vulnerability

An overview of zero-day vulnerability.

Personal Information

A definition of personal information with examples.

Cybersecurity

A definition of cybersecurity with examples.

Public Network

A definition of public network with examples.

Sandbox

A definition of sandbox with examples.
The most popular articles on Simplicable in the past day.

New Articles

Recent posts or updates on Simplicable.
Site Map