Onaylama (Attestation)
Doğrulanabilir dijital iddia.
Authentication Factors: 1. Knowledge: Passwords, PINs, Security questions. 2. Possession: OTPs, SMS codes, Hardware tokens (Yubico). 3. Inherence: Fingerprints, FaceID, Iris scans. Protocols: OIDC (Modern Web), SAML (Enterprise), LDAP (Internal Network), Kerberos (Windows Domains).
graph LR
Center["Onaylama (Attestation)"]:::main
Pre_digital_signature["digital-signature"]:::pre --> Center
click Pre_digital_signature "/terms/digital-signature"
Rel_decentralized_identifier_did["decentralized-identifier-did"]:::related -.-> Center
click Rel_decentralized_identifier_did "/terms/decentralized-identifier-did"
Rel_verifiable_credentials["verifiable-credentials"]:::related -.-> Center
click Rel_verifiable_credentials "/terms/verifiable-credentials"
Rel_zero_knowledge_proof["zero-knowledge-proof"]:::related -.-> Center
click Rel_zero_knowledge_proof "/terms/zero-knowledge-proof"
classDef main fill:#7c3aed,stroke:#8b5cf6,stroke-width:2px,color:white,font-weight:bold,rx:5,ry:5;
classDef pre fill:#0f172a,stroke:#3b82f6,color:#94a3b8,rx:5,ry:5;
classDef child fill:#0f172a,stroke:#10b981,color:#94a3b8,rx:5,ry:5;
classDef related fill:#0f172a,stroke:#8b5cf6,stroke-dasharray: 5 5,color:#94a3b8,rx:5,ry:5;
linkStyle default stroke:#4b5563,stroke-width:2px;
🧒 5 yaşındaki gibi açıkla
If you're going to a party, [authentication](/tr/terms/authentication) is the bouncer checking your ID card to make sure you are the person whose name is on the list. [Authorization](/tr/terms/authorization) is then the bouncer telling you whether you're allowed to go into the VIP room or just stay on the dance floor.
🤓 Expert Deep Dive
Technical authentication involves the exchange of cryptographic material. In a 'Challenge-Response' handshake, the server sends a random value that the client must sign with their private key. In web applications, successful authentication typically results in the issuance of a 'Session ID' or a 'Bearer Token' (like a JWT). Security best practices include 'Salted Hashing' (using Argon2 or bcrypt) for password storage, 'Zero-Knowledge Proofs' to verify credentials without transmitting them, and the implementation of 'Strict Transport Security' (HSTS) to prevent credential theft during the handshake.