For the role of the authenticator in the 802.1X authentication protocol, see IEEE 802.1X.
An authenticator is a means used to confirm a user's identity,[1][2] that is, to perform digital authentication. A person authenticates to a computer system or application by demonstrating that he or she has possession and control of an authenticator.[3][4] In the simplest case, the authenticator is a common password.
Using the terminology of the NIST Digital Identity Guidelines,[3] the party to be authenticated is called the claimant while the party verifying the identity of the claimant is called the verifier. When the claimant successfully demonstrates possession and control of one or more authenticators to the verifier through an established authentication protocol, the verifier is able to infer the claimant's identity.
^"National Information Assurance (IA) Glossary" (PDF). Committee on National Security Systems. 26 April 2010. Archived (PDF) from the original on 2022-10-09. Retrieved 31 March 2019.
^"Glossary of Telecommunication Terms". Institute for Telecommunication Sciences. 7 August 1996. Retrieved 31 March 2019.
^ abGrassi, Paul A.; Garcia, Michael E.; Fenton, James L. (June 2017). "NIST Special Publication 800-63-3: Digital Identity Guidelines". National Institute of Standards and Technology (NIST). doi:10.6028/NIST.SP.800-63-3. Retrieved 5 February 2019. {{cite journal}}: Cite journal requires |journal= (help)
^Lindemann, Rolf, ed. (11 April 2017). "FIDO Technical Glossary". FIDO Alliance. Retrieved 26 March 2019.
that he or she has possession and control of an authenticator. In the simplest case, the authenticator is a common password. Using the terminology of the...
Google Authenticator is a software-based authenticator by Google. It implements multi-factor authentication services using the time-based one-time password...
applicant to become a subscriber. Authentication – After becoming a subscriber, the user receives an authenticator e.g., a token and credentials, such...
hardware authenticator that can in turn be accessed via USB, Bluetooth Low Energy, or near-field communications (NFC). A roaming hardware authenticator conforms...
confirm these two attributes, the authenticator may employ several different techniques. The key to authentication is the idea that there is no single...
The Message Authenticator Algorithm (MAA) was one of the first cryptographic functions for computing a message authentication code (MAC). It was designed...
also known as digital authenticator, is used as an integrity check based on a secret key shared by two parties to authenticate information transmitted...
In the context of an HTTP transaction, basic access authentication is a method for an HTTP user agent (e.g. a web browser) to provide a user name and password...
HTTP authentication may refer to: Basic access authentication Digest access authentication This disambiguation page lists articles associated with the...
Mutual authentication or two-way authentication (not to be confused with two-factor authentication) refers to two parties authenticating each other at...
allows the receiving entity to authenticate the connecting entity (e.g. Client connecting to a Server) as well as authenticate itself to the connecting entity...
Email authentication, or validation, is a collection of techniques aimed at providing verifiable information about the origin of email messages by validating...
An authentication server provides a network service that applications use to authenticate the credentials, usually account names and passwords, of their...
Password manager List of password managers "Aegis Authenticator - Secure 2FA app for Android". Aegis Authenticator. Retrieved 29 April 2023. "Pricing for Individuals...
Professional Sports Authenticator (PSA) is a US based sports card and trading card grading company. PSA was launched in July 1991 by David Hall, owner...
including the Code, Identifier, Length, Authenticator and optional Attribute fields. The Authenticator is used to authenticate the reply from the RADIUS server...
The Client to Authenticator Protocol (CTAP) or X.1278 enables a roaming, user-controlled cryptographic authenticator (such as a smartphone or a hardware...
Strong authentication is a notion with several definitions. Strong authentication is often confused with two-factor authentication (more generally known...
Authenticated Encryption (AE) is an encryption scheme which simultaneously assures the data confidentiality (also known as privacy: the encrypted message...
cryptography, a message authentication code (MAC), sometimes known as an authentication tag, is a short piece of information used for authenticating and integrity-checking...
Key/Config-authentication is used to solve the problem of authenticating the keys of a person (say "person A") that some other person ("person B") is...
part of Poly1305-AES, a Carter–Wegman authenticator that combines the Poly1305 hash with AES-128 to authenticate many messages using a single short key...
the CSP, he or she receives the status of "subscriber", is given an authenticator, such as a token and a credential, which may be in the form of a username...