Authentication vs Authorization: What You Need to Know

Sep 8, 2021
-minute read

Authentication and authorization are both processes that fall under the category of identity and access management (IAM), but they serve different purposes. Understanding the role each plays in keeping data safe allows your organization to make better security decisions.

What Is Authentication?

Authentication is used to prove users are who they claim to be. A study by the Digital Shadows Photon Research Team in 2020 found that 15 billion stolen credentials allowing account takeover were available on the dark web, including username and password pairs for online banking, social media accounts, and music streaming services.

Most of us are used to authenticating our identity in everyday life. People are asked for a driver’s license or other form of identification to cash a check, buy alcohol or enter a restricted area. The lD is checked to make sure the person looks like the photo and the ID itself isn’t a fake. If the ID appears to be stolen or a fake, the person can be turned away, reported to law enforcement and/or the ID may be confiscated.

There are many ways to confirm a user’s identity online, and these fall into three types of authentication factors:

 

  • Something you know: information or secrets that are unique to you (e.g. passwords, PINs, answers to personal questions)
  • Something you have: confirming possession of a particular item (e.g. smartphone, card, key fob, physical tokens)
  • Something you are: a unique identifier of your physical person (e.g. fingerprint, facial scan, voice recognition)

Multi-factor authentication (MFA) refers to the use of two or more of these factors in verifying a user’s identity. For example, you might be asked for a password (something you know) and a one-time passcode sent to your smartphone (something you have). If either of these actions is not correctly completed, access is denied.

 

Diagram showing the three factors of MFA know have and are

What is Authorization?

Enterprises use authorization to grant access to resources using predetermined or customized permissions based on the user’s role, identity attributes or even certain risk factors. Once a user is authenticated, authorization dictates what data, apps and resources a verified user has permission to access, and it keeps unauthorized users from accessing things they shouldn’t, including on-premises apps and those in the cloud.

 

Diagram showing how authorization dictates what data apps and resources a verified user can access

By limiting permissions to only the resources a user needs, organizations keep sensitive information protected. For example, authorization policies may allow HR employees to access apps that store sensitive employee information, but deny access to marketing teams. Similarly, accounting teams may be able to access financial apps that other departments do not have permission to view.

Authorization can also be applied to customer use cases. For example, two customers may both be logged in to a retail website, but only one of them is a member of the VIP rewards program. An authorization policy would allow the VIP customer access to the rewards application, but not the other.

Certain authorization systems can even approve or deny access to data based on what customers have consented to sharing. This makes it easier to comply with privacy regulations and build customer trust.

Authentication vs Authorization

There are similarities and differences between authentication and authorization.

 

How are Authentication and Authorization Alike?

Authentication and authorization go hand-in-hand when it comes to identity and data security. They are both processes that determine whether a user should gain access to an application or system. Both authentication and authorization are designed to protect a system by ensuring that only the right users get access to the right things.

How are Authentication and Authorization Different?

When we talk about identity and access management (IAM), authentication is the identity verification process while authorization is the access management process. Authentication occurs first in the online experience, requiring users to provide credentials that prove they are who they say they are. Then comes authorization, which applies policies to evaluate what resources are appropriate for them to access.

As an example, think about an e-commerce site where you have a customer account.    

 

  • Authentication: To access your account, you have to verify yourself using one or more authentication factors. 

  • Authorization: The enterprise grants you certain permissions as a customer after  you are authenticated. You can access your account, review product descriptions, use shopping cart features, and so on. You are not authorized to use employee-only resources or features that require a certain level of security clearance or special permissions.

Share this Article:
Related Resources

Start Today

See how Ping can help you deliver secure employee, partner, and customer experiences in a rapidly evolving digital world.