Understanding AAA: Authentication vs Authorization
Q: Can you explain the difference between authentication, authorization, and accounting (AAA)?
- Authentication Protocols
- Junior level question
Explore all the latest Authentication Protocols interview questions and answers
ExploreMost Recent & up-to date
100% Actual interview focused
Create Authentication Protocols interview for FREE!
Certainly! Authentication, authorization, and accounting, commonly referred to as AAA, are critical components of network security but serve distinct purposes.
1. Authentication is the process of verifying the identity of a user or device. It answers the question, "Who are you?" For example, when a user enters a username and password to log into a network, the system checks the credentials against its database to confirm the user's identity.
2. Authorization occurs after authentication and determines what an authenticated user or device is allowed to do. It answers the question, "What are you allowed to do?" For instance, once a user is authenticated on a corporate network, authorization measures may limit their access to specific resources, such as allowing a regular employee to access certain files while restricting administrative access to sensitive system settings.
3. Accounting involves tracking what users do while they are authenticated and authorized. It answers the question, "What did you do?" This includes logging user activities, such as file access, changes made to the system, or network usage, which helps in monitoring user actions for auditing and compliance. For example, an organization may keep logs of user logins and the resources accessed to ensure compliance with security policies.
In summary, authentication verifies who you are, authorization determines what you can do, and accounting tracks your actions. Together, these components create a comprehensive security framework that protects network resources.
1. Authentication is the process of verifying the identity of a user or device. It answers the question, "Who are you?" For example, when a user enters a username and password to log into a network, the system checks the credentials against its database to confirm the user's identity.
2. Authorization occurs after authentication and determines what an authenticated user or device is allowed to do. It answers the question, "What are you allowed to do?" For instance, once a user is authenticated on a corporate network, authorization measures may limit their access to specific resources, such as allowing a regular employee to access certain files while restricting administrative access to sensitive system settings.
3. Accounting involves tracking what users do while they are authenticated and authorized. It answers the question, "What did you do?" This includes logging user activities, such as file access, changes made to the system, or network usage, which helps in monitoring user actions for auditing and compliance. For example, an organization may keep logs of user logins and the resources accessed to ensure compliance with security policies.
In summary, authentication verifies who you are, authorization determines what you can do, and accounting tracks your actions. Together, these components create a comprehensive security framework that protects network resources.


