{"id":1259,"date":"2019-09-20T12:57:28","date_gmt":"2019-09-20T04:57:28","guid":{"rendered":"http:\/\/people.utm.my\/rashidah\/?p=1259"},"modified":"2019-09-20T13:44:18","modified_gmt":"2019-09-20T05:44:18","slug":"the-difference-between-authentication-authorisation-and-access-control","status":"publish","type":"post","link":"https:\/\/people.utm.my\/rashidah\/2019\/09\/20\/the-difference-between-authentication-authorisation-and-access-control\/","title":{"rendered":"The difference between Authentication, Authorisation and Access Control"},"content":{"rendered":"<h6>It is important to have a clear difference of security concept &#8211; authentication, authorisation and access control.\u00a0 There are several discussion, some also provide analogy and comparison table. For better understanding you may study them and have your own definition.<\/h6>\n<h6>They are:<\/h6>\n<ol style=\"list-style-type: lower-alpha\">\n<li>\n<h6>IBM Knowledge Centre [<a href=\"https:\/\/www.ibm.com\/support\/knowledgecenter\/en\/SS5RWK_3.0.0\/com.ibm.discovery.es.ad.doc\/iiysasecauth.htm\">link<\/a>]<\/h6>\n<\/li>\n<li>\n<h6>Priocept [<a href=\"https:\/\/priocept.com\/2011\/08\/30\/authentication-vs-authorisation-vs-access-control\/\">link<\/a>]<\/h6>\n<\/li>\n<li>\n<h6>CloudKnox [<a href=\"https:\/\/cloudknox.io\/authentication-vs-access-controls-vs-authorization\/\">link<\/a>]<\/h6>\n<\/li>\n<li>\n<h6>BU TechWeb[<a href=\"https:\/\/www.bu.edu\/tech\/about\/security-resources\/bestpractice\/auth\/\">link<\/a>]<\/h6>\n<\/li>\n<\/ol>\n<h6><strong>DIY task in 10 minutes:<\/strong>\u00a0 <em>Write down your own definition of Authentication, Authorisation and Access Control on A4 paper. Submit during the class.<\/em><\/h6>\n<pre>Rashidah Kadir \r\n20190920 12:57pm(Jumaat)<\/pre>\n","protected":false},"excerpt":{"rendered":"<p>It is important to have a clear difference of security concept &#8211; authentication, authorisation and access control.\u00a0 There are several discussion, some also provide analogy and comparison table. For better understanding you may study them and have your own definition. They are: IBM Knowledge Centre [link] Priocept [link] CloudKnox [link] BU TechWeb[link] DIY task in &hellip; <a href=\"https:\/\/people.utm.my\/rashidah\/2019\/09\/20\/the-difference-between-authentication-authorisation-and-access-control\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">The difference between Authentication, Authorisation and Access Control<\/span><\/a><\/p>\n","protected":false},"author":582,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32,35],"tags":[],"class_list":["post-1259","post","type-post","status-publish","format-standard","hentry","category-cryptography","category-keselamatan-komputer"],"_links":{"self":[{"href":"https:\/\/people.utm.my\/rashidah\/wp-json\/wp\/v2\/posts\/1259","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/people.utm.my\/rashidah\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/people.utm.my\/rashidah\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/people.utm.my\/rashidah\/wp-json\/wp\/v2\/users\/582"}],"replies":[{"embeddable":true,"href":"https:\/\/people.utm.my\/rashidah\/wp-json\/wp\/v2\/comments?post=1259"}],"version-history":[{"count":24,"href":"https:\/\/people.utm.my\/rashidah\/wp-json\/wp\/v2\/posts\/1259\/revisions"}],"predecessor-version":[{"id":1283,"href":"https:\/\/people.utm.my\/rashidah\/wp-json\/wp\/v2\/posts\/1259\/revisions\/1283"}],"wp:attachment":[{"href":"https:\/\/people.utm.my\/rashidah\/wp-json\/wp\/v2\/media?parent=1259"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/people.utm.my\/rashidah\/wp-json\/wp\/v2\/categories?post=1259"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/people.utm.my\/rashidah\/wp-json\/wp\/v2\/tags?post=1259"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}