The process of authenticating the identity of an off-site user not within the
application serverÂ’s domain. This process is completed by a remote user
specifying an identity and some form of corresponding Â“proofÂ” of identity. The
proof provided is generally a secret string of letters and/or numbers (such as
a credit card number, a password,
or a Personal Identification Number such
as an important date to the user) that can then be verified.
Authentication; Fraud; Identity Theft or Masquerading; Password; Personal
Identification Number (PIN).
BEA Systems. Security Fundamentals. [Online, 2004.] BEA Systems Website.