Pre-claims authentication techniques
Pre-claims authentication techniques are the basics of authentication. Although these techniques are still heavily used in the identity landscape nowadays, they are old techniques, and frankly not secure enough anymore. In this section, we are going to cover password-based authentication and integrated authentication and look at the flaws of these authentication methods.
Password-based authentication
Throughout history, passwords have been used to verify someone's identity. In ancient Rome, watchwords were required for soldiers to enter certain areas. These watchwords were changed every day, engraved into tablets, and shared among the soldier units.
Passwords have also been used with computers since the earliest days of computing. The first computer system that implemented password login was the Compatible Time-Sharing System (CTSS), an operating system that was introduced at MIT in 1961. CTSS had a login command that requested a...