The purpose of authentication protocols is to fix a specific sequence of a series of steps that a user must complete in order to gain access to data. Each protocol must. support the inclusion of or more participants. ensure that Consumer Email List protocol is followed by all parties. be precise and clearly indicate the algorithm of actions. provide for actions for each of the possible situations be complete. There are many authentication protocols. The most common of them. Authenticate on a computer with. Login encrypted name. Login and password in conjunction PAP. Access cards. USB certificate SSO. Biometrics using voice fingerprints iris etc. Internet authentication using. Digital signatures and Secure SNMP to control devices connected to the network.
![Image](https://static.wixstatic.com/media/1236bd_c62e6500a1de4538a4ec6ba4600b8dac~mv2.jpg/v1/fill/w_674,h_386,al_c,lg_1,q_80,enc_auto/1236bd_c62e6500a1de4538a4ec6ba4600b8dac~mv2.jpg)
Cookies statistical data is collected about the user his sessions are tracked IP is bound. certificates with a public key type. SAML which ensures the exchange of information between parties. Kerberos Tickets mutual authentication through cryptographic keys. OpenID Connect creates single accounts for different resources and an OAuth . authentication addon. Authentication standards Authentication must be organized in accordance with the standards. GOST RISOIEC . The norms of the standard apply to simple with a password and strong with identity documents authentication. The document defines. in what format the information will be stored.