User Authentication ArticlesUser Authentication Principles Password-Based Authentication Token-Based Authentication Biometric Authentication Two-Factor Authentication Security Issues for User Authentication Kerberos Protocol Doc navigation← Message Authentication and Hash FunctionsIntrusion Detection and Prevention → How can we help? Name Email Subject Message