SlideShare a Scribd company logo
Difference between Authentication and Authorization in ASP.NET

      S.No   Authentication                         Authorization

      1      Meaning:                               Meaning:
             Authentication is the process of       Authorization is process of checking
             verifying the identity of a user.      whether the user has access rights to
                                                    the system.

      2      Example:                               Example:
             Suppose, we have 2 types of users      Once we know the user is valid, then
             ( normal and admins ) to a             we determine to which pages the user
             website. When the user tries to        has access to. Normal users should not
             access the website, we ask them to     be able to access admin pages. This is
             log in. This is authentication part.   authorization part.

      3      Types of Authentication:               Types of Authorization:
             Windows Authentication                 ACL authorization (also known as file
             Forms Authentication                   authorization)
             Passport Authentication                URL authorization

      4      Whent it takes place ?                 Whent it takes place ?
             Authentication always precedes to      Authorization takes place after
             Authorization,event if our             Authentication
             application lets anonymous users
             connect and use the application,it
             still authenticates them as
             anonymous.


And, further updates on difference between questions and answers, please visit my blog @
http://onlydifferencefaqs.blogspot.in/
Ad

Recommended

Authentication and Authorization in Asp.Net
Authentication and Authorization in Asp.Net
Shivanand Arur
 
Authentication vs authorization
Authentication vs authorization
Frank Victory
 
Authentication & Authorization in ASPdotNet MVC
Authentication & Authorization in ASPdotNet MVC
Mindfire Solutions
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
Introduction to xhtml
Introduction to xhtml
Dhairya Joshi
 
Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)
Ali Raw
 
Lecture 8 mail security
Lecture 8 mail security
rajakhurram
 
Kerberos
Kerberos
Sutanu Paul
 
Validation controls ASP .NET
Validation controls ASP .NET
baabtra.com - No. 1 supplier of quality freshers
 
Introduction to HTTP protocol
Introduction to HTTP protocol
Aviran Mordo
 
SAML Protocol Overview
SAML Protocol Overview
Mike Schwartz
 
Introduction of Html/css/js
Introduction of Html/css/js
Knoldus Inc.
 
AWS를 활용해서 글로벌 게임 런칭하기 - 박진성 AWS 솔루션즈 아키텍트 :: AWS Summit Seoul 2021
AWS를 활용해서 글로벌 게임 런칭하기 - 박진성 AWS 솔루션즈 아키텍트 :: AWS Summit Seoul 2021
Amazon Web Services Korea
 
jQuery
jQuery
Mohammed Arif
 
Web authentication & authorization
Web authentication & authorization
Alexandru Pasaila
 
What is suid, sgid and sticky bit
What is suid, sgid and sticky bit
Meenu Chopra
 
Role based access control - RBAC
Role based access control - RBAC
Ajit Dadresa
 
Xml namespace
Xml namespace
GayathriS578276
 
Asp.net state management
Asp.net state management
priya Nithya
 
Password Manager: Detailed presentation
Password Manager: Detailed presentation
Hitachi ID Systems, Inc.
 
Kerberos Authentication Protocol
Kerberos Authentication Protocol
Bibek Subedi
 
Ajax ppt
Ajax ppt
OECLIB Odisha Electronics Control Library
 
HTTP request and response
HTTP request and response
Sahil Agarwal
 
AWSでEC2上にMTAを構築した話
AWSでEC2上にMTAを構築した話
康宏 緒方
 
Html
Html
Mallikarjuna G D
 
Token Authentication in ASP.NET Core
Token Authentication in ASP.NET Core
Stormpath
 
LDAP - Lightweight Directory Access Protocol
LDAP - Lightweight Directory Access Protocol
S. Hasnain Raza
 
Javascript variables and datatypes
Javascript variables and datatypes
Varun C M
 
Authentication vs Authorization: Understanding the Key Differences
Authentication vs Authorization: Understanding the Key Differences
Kevin Mathew
 
REST API Authentication Methods.pdf
REST API Authentication Methods.pdf
Rubersy Ramos García
 

More Related Content

What's hot (20)

Validation controls ASP .NET
Validation controls ASP .NET
baabtra.com - No. 1 supplier of quality freshers
 
Introduction to HTTP protocol
Introduction to HTTP protocol
Aviran Mordo
 
SAML Protocol Overview
SAML Protocol Overview
Mike Schwartz
 
Introduction of Html/css/js
Introduction of Html/css/js
Knoldus Inc.
 
AWS를 활용해서 글로벌 게임 런칭하기 - 박진성 AWS 솔루션즈 아키텍트 :: AWS Summit Seoul 2021
AWS를 활용해서 글로벌 게임 런칭하기 - 박진성 AWS 솔루션즈 아키텍트 :: AWS Summit Seoul 2021
Amazon Web Services Korea
 
jQuery
jQuery
Mohammed Arif
 
Web authentication & authorization
Web authentication & authorization
Alexandru Pasaila
 
What is suid, sgid and sticky bit
What is suid, sgid and sticky bit
Meenu Chopra
 
Role based access control - RBAC
Role based access control - RBAC
Ajit Dadresa
 
Xml namespace
Xml namespace
GayathriS578276
 
Asp.net state management
Asp.net state management
priya Nithya
 
Password Manager: Detailed presentation
Password Manager: Detailed presentation
Hitachi ID Systems, Inc.
 
Kerberos Authentication Protocol
Kerberos Authentication Protocol
Bibek Subedi
 
Ajax ppt
Ajax ppt
OECLIB Odisha Electronics Control Library
 
HTTP request and response
HTTP request and response
Sahil Agarwal
 
AWSでEC2上にMTAを構築した話
AWSでEC2上にMTAを構築した話
康宏 緒方
 
Html
Html
Mallikarjuna G D
 
Token Authentication in ASP.NET Core
Token Authentication in ASP.NET Core
Stormpath
 
LDAP - Lightweight Directory Access Protocol
LDAP - Lightweight Directory Access Protocol
S. Hasnain Raza
 
Javascript variables and datatypes
Javascript variables and datatypes
Varun C M
 
Introduction to HTTP protocol
Introduction to HTTP protocol
Aviran Mordo
 
SAML Protocol Overview
SAML Protocol Overview
Mike Schwartz
 
Introduction of Html/css/js
Introduction of Html/css/js
Knoldus Inc.
 
AWS를 활용해서 글로벌 게임 런칭하기 - 박진성 AWS 솔루션즈 아키텍트 :: AWS Summit Seoul 2021
AWS를 활용해서 글로벌 게임 런칭하기 - 박진성 AWS 솔루션즈 아키텍트 :: AWS Summit Seoul 2021
Amazon Web Services Korea
 
Web authentication & authorization
Web authentication & authorization
Alexandru Pasaila
 
What is suid, sgid and sticky bit
What is suid, sgid and sticky bit
Meenu Chopra
 
Role based access control - RBAC
Role based access control - RBAC
Ajit Dadresa
 
Asp.net state management
Asp.net state management
priya Nithya
 
Kerberos Authentication Protocol
Kerberos Authentication Protocol
Bibek Subedi
 
HTTP request and response
HTTP request and response
Sahil Agarwal
 
AWSでEC2上にMTAを構築した話
AWSでEC2上にMTAを構築した話
康宏 緒方
 
Token Authentication in ASP.NET Core
Token Authentication in ASP.NET Core
Stormpath
 
LDAP - Lightweight Directory Access Protocol
LDAP - Lightweight Directory Access Protocol
S. Hasnain Raza
 
Javascript variables and datatypes
Javascript variables and datatypes
Varun C M
 

Similar to Difference between authentication and authorization in asp.net (20)

Authentication vs Authorization: Understanding the Key Differences
Authentication vs Authorization: Understanding the Key Differences
Kevin Mathew
 
REST API Authentication Methods.pdf
REST API Authentication Methods.pdf
Rubersy Ramos García
 
Authentication through Claims-Based Authentication
Authentication through Claims-Based Authentication
ijtsrd
 
Different Types of Auth in Rest Assured.pdf
Different Types of Auth in Rest Assured.pdf
ArunVastrad4
 
OAuth2 Implementation Presentation (Java)
OAuth2 Implementation Presentation (Java)
Knoldus Inc.
 
What is Authentication vs Authorization Difference? | INTROSERV
What is Authentication vs Authorization Difference? | INTROSERV
SaqifKhan3
 
Authentication and Authorization Defined_ What's the Difference_.pdf
Authentication and Authorization Defined_ What's the Difference_.pdf
Jack Forbes
 
Introduction to OAuth2
Introduction to OAuth2
Sean Whitesell
 
Authorization
Authorization
Faraz Qaisrani
 
Authentication and single sign on (sso)
Authentication and single sign on (sso)
Kumaresh Chandra Baruri
 
Microservice security with spring security 5.1,Oauth 2.0 and open id connect
Microservice security with spring security 5.1,Oauth 2.0 and open id connect
Nilanjan Roy
 
How to Find and Fix Broken Authentication Vulnerability
How to Find and Fix Broken Authentication Vulnerability
AshKhan85
 
Securing Your Web App: An Introduction to User Authentication and Authorization
Securing Your Web App: An Introduction to User Authentication and Authorization
ISH Technologies
 
Saadhvi Summit - oAuth Standards
Saadhvi Summit - oAuth Standards
Nirmal Kumar
 
Stateless Auth using OAUTH2 & JWT
Stateless Auth using OAUTH2 & JWT
Mobiliya
 
ADBMS.pptx
ADBMS.pptx
GauravWani20
 
AbedElilahElmahmoumP1.pptx
AbedElilahElmahmoumP1.pptx
AbedElElahElMHMOOM
 
CIS13: Taking the Hyperspace Bypass: Controlling User Access to Other Worlds
CIS13: Taking the Hyperspace Bypass: Controlling User Access to Other Worlds
CloudIDSummit
 
Web Programming - 12 Authentication and Authorization
Web Programming - 12 Authentication and Authorization
AndiNurkholis1
 
Authentication Concepts
Authentication Concepts
Charles Southerland
 
Authentication vs Authorization: Understanding the Key Differences
Authentication vs Authorization: Understanding the Key Differences
Kevin Mathew
 
Authentication through Claims-Based Authentication
Authentication through Claims-Based Authentication
ijtsrd
 
Different Types of Auth in Rest Assured.pdf
Different Types of Auth in Rest Assured.pdf
ArunVastrad4
 
OAuth2 Implementation Presentation (Java)
OAuth2 Implementation Presentation (Java)
Knoldus Inc.
 
What is Authentication vs Authorization Difference? | INTROSERV
What is Authentication vs Authorization Difference? | INTROSERV
SaqifKhan3
 
Authentication and Authorization Defined_ What's the Difference_.pdf
Authentication and Authorization Defined_ What's the Difference_.pdf
Jack Forbes
 
Introduction to OAuth2
Introduction to OAuth2
Sean Whitesell
 
Microservice security with spring security 5.1,Oauth 2.0 and open id connect
Microservice security with spring security 5.1,Oauth 2.0 and open id connect
Nilanjan Roy
 
How to Find and Fix Broken Authentication Vulnerability
How to Find and Fix Broken Authentication Vulnerability
AshKhan85
 
Securing Your Web App: An Introduction to User Authentication and Authorization
Securing Your Web App: An Introduction to User Authentication and Authorization
ISH Technologies
 
Saadhvi Summit - oAuth Standards
Saadhvi Summit - oAuth Standards
Nirmal Kumar
 
Stateless Auth using OAUTH2 & JWT
Stateless Auth using OAUTH2 & JWT
Mobiliya
 
CIS13: Taking the Hyperspace Bypass: Controlling User Access to Other Worlds
CIS13: Taking the Hyperspace Bypass: Controlling User Access to Other Worlds
CloudIDSummit
 
Web Programming - 12 Authentication and Authorization
Web Programming - 12 Authentication and Authorization
AndiNurkholis1
 
Ad

More from Umar Ali (20)

Difference between wcf and asp.net web api
Difference between wcf and asp.net web api
Umar Ali
 
Difference between ActionResult() and ViewResult()
Difference between ActionResult() and ViewResult()
Umar Ali
 
Difference between asp.net mvc 3 and asp.net mvc 4
Difference between asp.net mvc 3 and asp.net mvc 4
Umar Ali
 
Difference between asp.net web api and asp.net mvc
Difference between asp.net web api and asp.net mvc
Umar Ali
 
Difference between asp.net web forms and asp.net mvc
Difference between asp.net web forms and asp.net mvc
Umar Ali
 
ASP.NET MVC difference between questions list 1
ASP.NET MVC difference between questions list 1
Umar Ali
 
Link checkers 1
Link checkers 1
Umar Ali
 
Affiliate Networks Sites-1
Affiliate Networks Sites-1
Umar Ali
 
Technical Video Training Sites- 1
Technical Video Training Sites- 1
Umar Ali
 
US News Sites- 1
US News Sites- 1
Umar Ali
 
How to create user friendly file hosting link sites
How to create user friendly file hosting link sites
Umar Ali
 
Weak hadiths in tamil
Weak hadiths in tamil
Umar Ali
 
Bulughul Maram in tamil
Bulughul Maram in tamil
Umar Ali
 
Asp.net website usage and job trends
Asp.net website usage and job trends
Umar Ali
 
Indian news sites- 1
Indian news sites- 1
Umar Ali
 
Photo sharing sites- 1
Photo sharing sites- 1
Umar Ali
 
File hosting search engines
File hosting search engines
Umar Ali
 
Ajax difference faqs compiled- 1
Ajax difference faqs compiled- 1
Umar Ali
 
ADO.NET difference faqs compiled- 1
ADO.NET difference faqs compiled- 1
Umar Ali
 
Dotnet differences compiled -1
Dotnet differences compiled -1
Umar Ali
 
Difference between wcf and asp.net web api
Difference between wcf and asp.net web api
Umar Ali
 
Difference between ActionResult() and ViewResult()
Difference between ActionResult() and ViewResult()
Umar Ali
 
Difference between asp.net mvc 3 and asp.net mvc 4
Difference between asp.net mvc 3 and asp.net mvc 4
Umar Ali
 
Difference between asp.net web api and asp.net mvc
Difference between asp.net web api and asp.net mvc
Umar Ali
 
Difference between asp.net web forms and asp.net mvc
Difference between asp.net web forms and asp.net mvc
Umar Ali
 
ASP.NET MVC difference between questions list 1
ASP.NET MVC difference between questions list 1
Umar Ali
 
Link checkers 1
Link checkers 1
Umar Ali
 
Affiliate Networks Sites-1
Affiliate Networks Sites-1
Umar Ali
 
Technical Video Training Sites- 1
Technical Video Training Sites- 1
Umar Ali
 
US News Sites- 1
US News Sites- 1
Umar Ali
 
How to create user friendly file hosting link sites
How to create user friendly file hosting link sites
Umar Ali
 
Weak hadiths in tamil
Weak hadiths in tamil
Umar Ali
 
Bulughul Maram in tamil
Bulughul Maram in tamil
Umar Ali
 
Asp.net website usage and job trends
Asp.net website usage and job trends
Umar Ali
 
Indian news sites- 1
Indian news sites- 1
Umar Ali
 
Photo sharing sites- 1
Photo sharing sites- 1
Umar Ali
 
File hosting search engines
File hosting search engines
Umar Ali
 
Ajax difference faqs compiled- 1
Ajax difference faqs compiled- 1
Umar Ali
 
ADO.NET difference faqs compiled- 1
ADO.NET difference faqs compiled- 1
Umar Ali
 
Dotnet differences compiled -1
Dotnet differences compiled -1
Umar Ali
 
Ad

Recently uploaded (20)

Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Priyanka Aash
 
“MPU+: A Transformative Solution for Next-Gen AI at the Edge,” a Presentation...
“MPU+: A Transformative Solution for Next-Gen AI at the Edge,” a Presentation...
Edge AI and Vision Alliance
 
Using the SQLExecutor for Data Quality Management: aka One man's love for the...
Using the SQLExecutor for Data Quality Management: aka One man's love for the...
Safe Software
 
Mastering AI Workflows with FME by Mark Döring
Mastering AI Workflows with FME by Mark Döring
Safe Software
 
Securing AI - There Is No Try, Only Do!.pdf
Securing AI - There Is No Try, Only Do!.pdf
Priyanka Aash
 
Python Conference Singapore - 19 Jun 2025
Python Conference Singapore - 19 Jun 2025
ninefyi
 
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
revolcs10
 
Security Tips for Enterprise Azure Solutions
Security Tips for Enterprise Azure Solutions
Michele Leroux Bustamante
 
Salesforce Summer '25 Release Frenchgathering.pptx.pdf
Salesforce Summer '25 Release Frenchgathering.pptx.pdf
yosra Saidani
 
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Priyanka Aash
 
PyCon SG 25 - Firecracker Made Easy with Python.pdf
PyCon SG 25 - Firecracker Made Easy with Python.pdf
Muhammad Yuga Nugraha
 
AI vs Human Writing: Can You Tell the Difference?
AI vs Human Writing: Can You Tell the Difference?
Shashi Sathyanarayana, Ph.D
 
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC
 
Quantum AI: Where Impossible Becomes Probable
Quantum AI: Where Impossible Becomes Probable
Saikat Basu
 
The Future of Technology: 2025-2125 by Saikat Basu.pdf
The Future of Technology: 2025-2125 by Saikat Basu.pdf
Saikat Basu
 
Quantum AI Discoveries: Fractal Patterns Consciousness and Cyclical Universes
Quantum AI Discoveries: Fractal Patterns Consciousness and Cyclical Universes
Saikat Basu
 
Smarter Aviation Data Management: Lessons from Swedavia Airports and Sweco
Smarter Aviation Data Management: Lessons from Swedavia Airports and Sweco
Safe Software
 
OpenPOWER Foundation & Open-Source Core Innovations
OpenPOWER Foundation & Open-Source Core Innovations
IBM
 
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Priyanka Aash
 
Lessons Learned from Developing Secure AI Workflows.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Priyanka Aash
 
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Priyanka Aash
 
“MPU+: A Transformative Solution for Next-Gen AI at the Edge,” a Presentation...
“MPU+: A Transformative Solution for Next-Gen AI at the Edge,” a Presentation...
Edge AI and Vision Alliance
 
Using the SQLExecutor for Data Quality Management: aka One man's love for the...
Using the SQLExecutor for Data Quality Management: aka One man's love for the...
Safe Software
 
Mastering AI Workflows with FME by Mark Döring
Mastering AI Workflows with FME by Mark Döring
Safe Software
 
Securing AI - There Is No Try, Only Do!.pdf
Securing AI - There Is No Try, Only Do!.pdf
Priyanka Aash
 
Python Conference Singapore - 19 Jun 2025
Python Conference Singapore - 19 Jun 2025
ninefyi
 
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
revolcs10
 
Security Tips for Enterprise Azure Solutions
Security Tips for Enterprise Azure Solutions
Michele Leroux Bustamante
 
Salesforce Summer '25 Release Frenchgathering.pptx.pdf
Salesforce Summer '25 Release Frenchgathering.pptx.pdf
yosra Saidani
 
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Priyanka Aash
 
PyCon SG 25 - Firecracker Made Easy with Python.pdf
PyCon SG 25 - Firecracker Made Easy with Python.pdf
Muhammad Yuga Nugraha
 
AI vs Human Writing: Can You Tell the Difference?
AI vs Human Writing: Can You Tell the Difference?
Shashi Sathyanarayana, Ph.D
 
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC
 
Quantum AI: Where Impossible Becomes Probable
Quantum AI: Where Impossible Becomes Probable
Saikat Basu
 
The Future of Technology: 2025-2125 by Saikat Basu.pdf
The Future of Technology: 2025-2125 by Saikat Basu.pdf
Saikat Basu
 
Quantum AI Discoveries: Fractal Patterns Consciousness and Cyclical Universes
Quantum AI Discoveries: Fractal Patterns Consciousness and Cyclical Universes
Saikat Basu
 
Smarter Aviation Data Management: Lessons from Swedavia Airports and Sweco
Smarter Aviation Data Management: Lessons from Swedavia Airports and Sweco
Safe Software
 
OpenPOWER Foundation & Open-Source Core Innovations
OpenPOWER Foundation & Open-Source Core Innovations
IBM
 
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Priyanka Aash
 
Lessons Learned from Developing Secure AI Workflows.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Priyanka Aash
 

Difference between authentication and authorization in asp.net

  • 1. Difference between Authentication and Authorization in ASP.NET S.No Authentication Authorization 1 Meaning: Meaning: Authentication is the process of Authorization is process of checking verifying the identity of a user. whether the user has access rights to the system. 2 Example: Example: Suppose, we have 2 types of users Once we know the user is valid, then ( normal and admins ) to a we determine to which pages the user website. When the user tries to has access to. Normal users should not access the website, we ask them to be able to access admin pages. This is log in. This is authentication part. authorization part. 3 Types of Authentication: Types of Authorization: Windows Authentication ACL authorization (also known as file Forms Authentication authorization) Passport Authentication URL authorization 4 Whent it takes place ? Whent it takes place ? Authentication always precedes to Authorization takes place after Authorization,event if our Authentication application lets anonymous users connect and use the application,it still authenticates them as anonymous. And, further updates on difference between questions and answers, please visit my blog @ http://onlydifferencefaqs.blogspot.in/