Authentication Architectures


Click here to start

Table of Contents

Authentication Architectures

Why Authentication?

A Long Time Ago...

Approach 1: Passwords

Approach 2: Smart Cards

Approach 3: Hand-held Tokens

Approach 4: Proxy Logins

Approach 5

Lessons Learned

From the Baltimore Sun,13 June 1989

Fast Forward: Security for the NNS

Web Browsers and OSSes

Browsers Versus Tokens

How Should Browsers Do Authentication?

Authentication Cookies


The Myth of the PKI

“I Left my Token Home”

Upcoming Issues

Single Sign-on

Role-Based Authentication


Trustworthy Platforms

The Role of Architecture

No Panaceas

Author: Steven M. Bellovin


Home Page:

Download presentation source