Whenever the user tries to access a resource, the server will check if the user has appropriate permissions to access the resource or not. In this article we will look at some of the common types of Authentication used these days, discuss the vulnerabilities in them, and then move on to some attacks against these Authentication types.
An apostille is an official document certifying that the notary who performed a particular notarial act was a notary in good standing at the time of the notarization. A security measure designed to protect a communications system against acceptance of a fraudulent transmission or simulation by establishing the validity of a transmission, message, or originator. A means of identifying individuals and verifying their eligibility to receive specific categories of information.Authentication is essentially the process of validating a user is who they say they are, such that they can gain access to a system – in this context, the system is Share Point.For that the user will have to supply some credentials and the web server validates it.All subsequent decisions are then taken on the basis of the credentials supplied by the client. Once the user is Authenticated, the web server sets up the appropriate permissions for the user on its resources.