Password-based authentication and role-based authentication

What are the differences between password-based authentication and role-based authentication? What are their advantages and disadvantages?

Answer preview

According to De Nicola, Ferrari, Pugliese & Venneri (2000), role-based authentication is based on the particular roles of individuals responsibilities and job authority. A user gains access to a software, object or information based on the assigned role which varies with the job. It must be tailored to a firm’s business and security risk tolerance. One of the advantages is that it requires little or no maintenance after it has been implemented. It not only provides security but also increases efficiency. This is achieved by providing useful resources that will enable a user with a particular role to carry out the tasks better and faster. Through this authentication, applications that are unnecessary may be done away with to save on administrative costs while additional ones may be set up to increase efficiency. It also enables hierarchy and rights inheritance which facilitates monitoring of subordinates. However, this authentication may be difficult to design and implement. Users may also require training so as to efficiently use it.

[386 Words]

Password-based authentication and role-based authentication
Scroll to Top