+256 392 201102

  • Home
  • About
  • What We Do
  • Updates
    • Our Updates
    • Our Gallery
  • Portfolio
  • Contact
Seek Support!

Home

Daily Archives: November 12, 2020

identification-authentication-authorization

Difference between Identification, Authentication & Authorization

We all have been identified, authenticated and authorized almost everyday of our online life.
What we do not know most of the time is where each of this comes in while accessing our online platforms and we end up confusing the 3 words often using the terms identification or authorization when, in fact, they are talking about authentication.

But as long as we are able to understand what we are talking about, it has not mattered to us to get the meanings of these 3 words.

It is always better to know the meaning of the words you use, though, and sooner or later, you will run into a geek who will drive you crazy with clarifications, whether it’s authorization versus authentication, fewer or less, which or that, and so on & to be honest, you could even catch an attitude!

So what do these 3 words actually mean?

  • Identification occurs when a subject claims an identity (such as with a username)
  • Authentication occurs when a subject proves their identity such as with a password (for example, by comparing the password entered with the password stored in the database)
  • Authorization techniques can grant or block access to objects based on their proven. This is the function of specifying access rights/privileges to resources.”

🙂

So, now you know in what ways identification is different from authentication and authorization. One more important point: Authentication is perhaps the key process in terms of the security of your account. If you are using a weak password for authentication, your account could easily be hijacked. Therefore:

  • Create strong and unique passwords for all of your accounts.
  • If you have trouble remembering your passwords, a password manager has your back. It can help with generating passwords, too.
  • Activate two-factor authentication, with one-time verification codes in text messages or an authenticator application, for every service that supports it. Otherwise, some anonymous raccoon that got its paws on your password will be able to read your secret correspondence or do something even nastier.

The 3 words are so easy to confused and people always get mixed up using them. Hope this article has made it clearer now!

Read More

Recent Posts

  • U.S. Ruling on NSO Sends Warning as Pegasus Targets Ugandan Journalists
  • Uganda’s Move to Procure Social Media Tracking Tool: A New Threat to Digital Rights and Freedoms
  • THE NON-GOVERNMENTAL ORGANISATIONS ACT
  • The Guardians of Peace: The Crucial Role of Human Rights Defenders in Building a Peaceful World
  • Holding Regulators Accountable for Data Privacy and Protection in Uganda’s NGO Sector -DPI

Recent Comments

    Archives

    • May 2025
    • April 2025
    • November 2024
    • September 2024
    • August 2024
    • June 2024
    • May 2024
    • April 2024
    • March 2024
    • February 2024
    • December 2023
    • November 2023
    • October 2023
    • May 2022
    • October 2021
    • September 2021
    • July 2021
    • June 2021
    • May 2021
    • March 2021
    • February 2021
    • January 2021
    • November 2020
    • September 2020
    • July 2020
    • March 2020
    • January 2020
    • August 2019
    • June 2019
    • May 2019
    • November 2018
    • October 2018
    • March 2018
    • October 2017
    • September 2017
    • June 2017
    • April 2017

    Categories

    • Advocacy
    • Advocacy
    • AML/CTF
    • Business
    • Civic Space
    • Digital Security
    • Digital Security
    • Ekyooto
    • FATF
    • LEDs Protection
    • Projects/Our Work Section
    • Research
    • Risk Assessment
    • Security
    • Security
    • Uncategorized
    • Web Applications
    • women@web

    Meta

    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org

    DPI aims at contributing to the promotion and protection of human rights, good governance, rule of law, peace and democracy by strengthening the capacity of human rights defenders (HRDs)

    QUICK LINKS
    • Digital Security Expo 2022
    • Talk to your Regulator
    • Citizen Eye
    • Our Gallery
    • Privacy Policy
    CONTACT

    Plot 21 Commercial Road, Ntinda
    Kampala, Uganda

    • [email protected]
    • +256 392 201102
    © 2025 Defenders Protection Initiative. All rights reserved.
    Shopping Basket
    Let's Chat!
    Scan the code
    WhatsApp
    Hello 👋
    We're available on WhatsApp. Can we help you?