Process by which an individual gains access to a computer system
"Logon" redirects here. Not to be confused with Logone River.
For other uses, see Login (disambiguation).
To log in to Wikipedia, use Special:UserLogin. To log out from Wikipedia, use Special:UserLogout
This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed. Find sources: "Login" – news · newspapers · books · scholar · JSTOR(February 2024) (Learn how and when to remove this template message)
In computer security, logging in (or logging on, signing in, or signing on) is the process by which an individual gains access to a computer system or program by identifying and authenticating themselves.
The user credentials are typically some form of username and a password,[1] and these credentials themselves are sometimes referred to as alogin.[2]
In practice, modern secure systems often require a second factor such as email or SMS confirmation for extra security.
Social login allows a user to use an existing cell phone number, or user credentials from another email or social networking service to sign in or create an account on a new website.
When access is no longer needed, the user can log out, log off, sign out or sign off.
^"Detail and definition of login and logging in". The Linux Information Project. Archived from the original on 25 December 2019. Retrieved 1 January 2014.
^"Definition of login". Oxford Dictionaries. Archived from the original on 7 February 2014. Retrieved 8 February 2014..
as a login. In practice, modern secure systems often require a second factor such as email or SMS confirmation for extra security. Social login allows...
A login manager is a login system for Unix and Unix-like operating systems. It comprises a login daemon, a login user interface, and a system for tracking...
Social login is a form of single sign-on using existing information from a social networking service such as Facebook, Twitter or Google, to login to a...
In computing, a login session is the period of activity between a user logging in and logging out of a (multi-user) system. On Unix and Unix-like operating...
Login spoofings are techniques used to steal a user's password. The user is presented with an ordinary looking login prompt for username and password,...
Login VSI maximizes the end-user experience for all digital workspaces. Login VSI's flagship product, Login Enterprise, is an automated testing platform...
graphical login manager which starts a login session on an X server from the same or another computer. A display manager presents the user with a login screen...
Call login systems are telephone systems that allow voice-based call center executives to log into their phone equipment in order to make or receive calls...
upon startup. "login" means a file is read if the shell is a login shell. "n/login" means a file is read if the shell is not a login shell. "int." means...
attempt to trick individuals into giving away sensitive information or login credentials. Most attacks are "bulk attacks" that are not targeted and are...
Sir John Spencer Login (9 November 1809 – 18 October 1863) was a Scottish surgeon in British India, best remembered as the guardian of Maharajah Duleep...
access to user accounts on other systems through large-scale automated login requests directed against a web application. Unlike credential cracking...
"squirrel") or Secure, Quick, Reliable Login (formerly Secure QR Login) is a draft open standard for secure website login and authentication. The software typically...
Login Halt railway station served the hamlet of Login, Carmarthenshire, Wales, from 1875 to 1962 on the Whitland and Cardigan Railway. The station was...
SlickLogin was an Israeli start-up company that developed sound-based password alternatives. The company's goal was to enable end users to log in easily...
OneLogin, Inc. is a cloud-based identity and access management (IAM) provider that develops a unified access management (UAM) platform for enterprise-level...
identity, i.e. enable social login, include: Microsoft account – Formerly Windows Live ID Google Account Facebook – Login to public social venues. Yahoo...
contents of the last login log file, /var/log/lastlog (which is a usually a very sparse file), including the login name, port, and last login date and time....
special key or key combination to be pressed on a computer keyboard before a login screen which must, to the user, be completely trustworthy. The operating...
lawmakers in the US state of Tennessee passed a bill that makes sharing login information for sites that provide music and movies, such as Netflix and...
myOneLogin was a Secure Cloud Identity Services platform launched by TriCipher in 2008. It allows users access to many applications with a single secure...