SlideShare a Scribd company logo
3
Most read
4
Most read
5
Most read
Study Program of Information Systems
Faculty of Engineering and Computer Science
SY. 2020-2021
Andi Nurkholis, S.Kom., M.Kom.
December 28, 2020
2
3
Authentication is used by a system when the system
needs to know exactly who is accessing their information
or site. Authentication is used by a client when the client
needs to know that the server is system it claims to be.
4
Laravel makes
implementing
authentication very
simple.
In fact, almost everything
is configured for you out
of the box.
• In authentication, the user has to prove its
identity to the system.
• Usually, authentication by a server entails
the use of a user name and password.
• Authentication does not determine what
tasks the individual can do or what files the
individual can see. Authentication merely
identifies and verifies who the user is.
5
6
7
Authorization is a process by which a system determines if the
client has permission to use a resource or access a file.
• Authorization is usually coupled with authentication so that the
system has some concept of who the client is that is requesting
access.
• The type of authentication required for authorization may vary;
passwords may be required in some cases but not in others.
• In some cases, there is no authorization; any user may be use a
resource or access a file simply by asking for it.
8
9
Andi Nurkholis, S.Kom., M.Kom.
September 28, 2020December 28, 2020
Study Program of Information Systems
Faculty of Engineering and Computer Science
SY. 2020-2021

More Related Content

PDF
Deltecs Services for Vulnerability Assessment and penetration testing
PPTX
Secure Code Warrior - Least privilege
PPTX
Secure Code Warrior - Secure by default
PDF
Client /server security overview
PPTX
Web authentication & authorization
PDF
DON'T BE A LOW HANGING FRUIT!
PPTX
Authentication vs authorization
PPTX
Most Common Application Level Attacks
Deltecs Services for Vulnerability Assessment and penetration testing
Secure Code Warrior - Least privilege
Secure Code Warrior - Secure by default
Client /server security overview
Web authentication & authorization
DON'T BE A LOW HANGING FRUIT!
Authentication vs authorization
Most Common Application Level Attacks

What's hot (17)

PPTX
website phishing by NR
PPTX
Secure Code Warrior - Client side injection
PDF
Alert logic anatomy owasp infographic
PPTX
Secure Code Warrior - Fail securely
PDF
Phishing Attacks: A Challenge Ahead
PPT
Software Security Testing
PPTX
Secure Code Warrior - Poor authorization and authentication
PDF
I1804015458
PPT
PDF
OWASP Evening #10 Serbia
PDF
Dotnet security analysis of a single sign-on mechanism for distributed compu...
PPTX
What's new in​ CEHv11?
PPTX
Secure Code Warrior - Security decisions via untrusted inputs
PDF
Detecting phishing websites using associative classification (2)
PDF
OWASP Evening #10
PPTX
Detection of phishing websites
PPTX
Top 10 web server security flaws
website phishing by NR
Secure Code Warrior - Client side injection
Alert logic anatomy owasp infographic
Secure Code Warrior - Fail securely
Phishing Attacks: A Challenge Ahead
Software Security Testing
Secure Code Warrior - Poor authorization and authentication
I1804015458
OWASP Evening #10 Serbia
Dotnet security analysis of a single sign-on mechanism for distributed compu...
What's new in​ CEHv11?
Secure Code Warrior - Security decisions via untrusted inputs
Detecting phishing websites using associative classification (2)
OWASP Evening #10
Detection of phishing websites
Top 10 web server security flaws
Ad

Similar to Web Programming - 12 Authentication and Authorization (20)

PDF
What is Authentication vs Authorization Difference? | INTROSERV
PDF
Chapter 3 security principals
PDF
Laravel Security_ Protecting Your Web Applications.pdf
PPTX
Laravel Security Standards
PPTX
Authentication without Authentication - AppSec California
ODP
Authentication Concepts
PDF
Authentication and Authorization Defined_ What's the Difference_.pdf
PPTX
Authorization
PPT
Web authentication
PDF
Stay safe online- understanding authentication methods
PPTX
Authorization
PDF
Two-factor authentication- A sample writing _Zaman
PDF
Authentication vs Authorization: Understanding the Key Differences
PPT
Authentication and authorization difference
PPTX
Ecommerce_Ch4.pptx
PPTX
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PPTX
Authentication and session v4
PPTX
Cryptography and network Security--MOD-1.pptx
PDF
App Authentication
PPTX
Security in laravel
What is Authentication vs Authorization Difference? | INTROSERV
Chapter 3 security principals
Laravel Security_ Protecting Your Web Applications.pdf
Laravel Security Standards
Authentication without Authentication - AppSec California
Authentication Concepts
Authentication and Authorization Defined_ What's the Difference_.pdf
Authorization
Web authentication
Stay safe online- understanding authentication methods
Authorization
Two-factor authentication- A sample writing _Zaman
Authentication vs Authorization: Understanding the Key Differences
Authentication and authorization difference
Ecommerce_Ch4.pptx
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
Authentication and session v4
Cryptography and network Security--MOD-1.pptx
App Authentication
Security in laravel
Ad

More from AndiNurkholis1 (20)

PDF
Technopreneurship - 9 Analisis Biaya dan Keuangan
PDF
Pengantar Bisnis - 14 Manajemen Keuangan
PDF
Pengantar Bisnis - 13 Manajemen Operasi
PDF
Pengantar Bisnis - 12 Kebijakan Harga
PDF
Pengantar Bisnis - 11 Kebijakan Distribusi
PDF
Technopreneurship - 8 Manajemen Sumber Daya Manusia
PDF
Pengantar Bisnis - 10 Kebijakan Produk
PDF
Technopreneurship - 7 Manajemen Pemasaran dan Operasional Bisnis
PDF
Pengantar Bisnis - 9 Manajemen Pemasaran
PDF
Technopreneurship - 6 Business Plan
PDF
Pengantar Bisnis - 8 Kepemimpinan
PDF
Technopreneurship - 5 Model Bisnis
PDF
Technopreneurship - 4 Studi Kelayakan Usaha
PDF
Pengantar Bisnis - 7 Motivasi Kerja
PDF
Pengantar Bisnis - 6 Manajemen Sumber Daya Manusia
PDF
Pengantar Bisnis - 5 Pengelolaan & Pengorganisasian Bisnis
PDF
Technopreneurship - 3 Ide dan Prinsip Bisnis
PDF
Pengantar Bisnis - 4 Bentuk Organisasi Bisnis
PDF
Technopreneurship - 2 Pengantar Technopreneurship
PDF
Pengantar Bisnis - 3 Globalisasi Ekonomi & Bisnis Internasional
Technopreneurship - 9 Analisis Biaya dan Keuangan
Pengantar Bisnis - 14 Manajemen Keuangan
Pengantar Bisnis - 13 Manajemen Operasi
Pengantar Bisnis - 12 Kebijakan Harga
Pengantar Bisnis - 11 Kebijakan Distribusi
Technopreneurship - 8 Manajemen Sumber Daya Manusia
Pengantar Bisnis - 10 Kebijakan Produk
Technopreneurship - 7 Manajemen Pemasaran dan Operasional Bisnis
Pengantar Bisnis - 9 Manajemen Pemasaran
Technopreneurship - 6 Business Plan
Pengantar Bisnis - 8 Kepemimpinan
Technopreneurship - 5 Model Bisnis
Technopreneurship - 4 Studi Kelayakan Usaha
Pengantar Bisnis - 7 Motivasi Kerja
Pengantar Bisnis - 6 Manajemen Sumber Daya Manusia
Pengantar Bisnis - 5 Pengelolaan & Pengorganisasian Bisnis
Technopreneurship - 3 Ide dan Prinsip Bisnis
Pengantar Bisnis - 4 Bentuk Organisasi Bisnis
Technopreneurship - 2 Pengantar Technopreneurship
Pengantar Bisnis - 3 Globalisasi Ekonomi & Bisnis Internasional

Recently uploaded (20)

PDF
Chapter 2 Digital Image Fundamentals.pdf
PPTX
Comunidade Salesforce São Paulo - Desmistificando o Omnistudio (Vlocity)
PDF
cuic standard and advanced reporting.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Cloud computing and distributed systems.
PPT
Teaching material agriculture food technology
PPTX
MYSQL Presentation for SQL database connectivity
PDF
KodekX | Application Modernization Development
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
madgavkar20181017ppt McKinsey Presentation.pdf
PPTX
Telecom Fraud Prevention Guide | Hyperlink InfoSystem
PDF
AI And Its Effect On The Evolving IT Sector In Australia - Elevate
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
How Onsite IT Support Drives Business Efficiency, Security, and Growth.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Modernizing your data center with Dell and AMD
PDF
HCSP-Presales-Campus Network Planning and Design V1.0 Training Material-Witho...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
Chapter 2 Digital Image Fundamentals.pdf
Comunidade Salesforce São Paulo - Desmistificando o Omnistudio (Vlocity)
cuic standard and advanced reporting.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Cloud computing and distributed systems.
Teaching material agriculture food technology
MYSQL Presentation for SQL database connectivity
KodekX | Application Modernization Development
NewMind AI Monthly Chronicles - July 2025
madgavkar20181017ppt McKinsey Presentation.pdf
Telecom Fraud Prevention Guide | Hyperlink InfoSystem
AI And Its Effect On The Evolving IT Sector In Australia - Elevate
20250228 LYD VKU AI Blended-Learning.pptx
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
Spectral efficient network and resource selection model in 5G networks
How Onsite IT Support Drives Business Efficiency, Security, and Growth.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Modernizing your data center with Dell and AMD
HCSP-Presales-Campus Network Planning and Design V1.0 Training Material-Witho...
Per capita expenditure prediction using model stacking based on satellite ima...

Web Programming - 12 Authentication and Authorization

  • 1. Study Program of Information Systems Faculty of Engineering and Computer Science SY. 2020-2021 Andi Nurkholis, S.Kom., M.Kom. December 28, 2020
  • 2. 2
  • 3. 3 Authentication is used by a system when the system needs to know exactly who is accessing their information or site. Authentication is used by a client when the client needs to know that the server is system it claims to be.
  • 4. 4 Laravel makes implementing authentication very simple. In fact, almost everything is configured for you out of the box.
  • 5. • In authentication, the user has to prove its identity to the system. • Usually, authentication by a server entails the use of a user name and password. • Authentication does not determine what tasks the individual can do or what files the individual can see. Authentication merely identifies and verifies who the user is. 5
  • 6. 6
  • 7. 7 Authorization is a process by which a system determines if the client has permission to use a resource or access a file.
  • 8. • Authorization is usually coupled with authentication so that the system has some concept of who the client is that is requesting access. • The type of authentication required for authorization may vary; passwords may be required in some cases but not in others. • In some cases, there is no authorization; any user may be use a resource or access a file simply by asking for it. 8
  • 9. 9
  • 10. Andi Nurkholis, S.Kom., M.Kom. September 28, 2020December 28, 2020 Study Program of Information Systems Faculty of Engineering and Computer Science SY. 2020-2021