While evaluating the practical applicability of IT-based authentication and authorization techniques for IIoT use cases, it is important that we keep in perspective the unique demands of the cyber-physical world (discussed in the Distinguishing features of IAM for IIoT section).
Note: This section and all subsequent sections of this chapter assume that the reader has a basic familiarity with modern cryptography.
Figure 3.2 summarizes the three main approaches of authentication:
![](https://static.packt-cdn.com/products/9781788832687/graphics/assets/a647e088-3648-449a-86eb-a62b3a5c2a68.png)
Figure 3.2: Examples of authentication factors