The reason for extracting the Authentication from the Authorisation is primarily to keep unrelated functions in different packages.
The Authentication function deals with the task of establishing a verified identity of a user or system. This operation typically occurs at the establishment of a session and will durate for a time. When expiring, the user/system should renew the authentication. The duration might depend on the classification of data, which is out of scope of the authentication, but should be configurable in the service.
There are different ways of establishing the Authentication, for example a username/password, 2-phase login, biometrics or mechanical tags such as RFID. These methods should be interchangeable at a defined service interface to decouple the authentication from other functions such as authorisation.
Currently, there exists some implementations in the industry, such as Swedish BankID and Single-sign-on solutions from Microsoft. Implementations of an Authentication System can be related/tied to the implementation of Authorisation if the situation is preferred.
The reason for extracting the Authentication from the Authorisation is primarily to keep unrelated functions in different packages.
The Authentication function deals with the task of establishing a verified identity of a user or system. This operation typically occurs at the establishment of a session and will durate for a time. When expiring, the user/system should renew the authentication. The duration might depend on the classification of data, which is out of scope of the authentication, but should be configurable in the service.
There are different ways of establishing the Authentication, for example a username/password, 2-phase login, biometrics or mechanical tags such as RFID. These methods should be interchangeable at a defined service interface to decouple the authentication from other functions such as authorisation.
Currently, there exists some implementations in the industry, such as Swedish BankID and Single-sign-on solutions from Microsoft. Implementations of an Authentication System can be related/tied to the implementation of Authorisation if the situation is preferred.