The 7 Most Used Authentication Methods
Any organization deploying an information system needs a reliable connection to its systems and applications. Creating a single and reliable identity source, associated with rights management, is the basis for good identity and access management. This paper is an introduction to strong authentication and secure access to target applications. It reviews the seven most frequently used authentication methods, and describes their main mechanisms. It associates with them the main functions of a Single Sign-On (SSO) engine.