Authentication: checking who the user is.
For authentication, the user provides credentials, such as username and password, and if the credentials are valid, the user receives a token, which can be sent with future requests as confirmation of its authentication.
Authorization: determining what the user is allowed to do.
From the point of view of users, successful authorization occurs when it can send a request to access the system and do something (for example, upload a file to the system), and it works.
Authentication only checks the identifier - this confirms that the user is who she claims to be. Authorization determines which resources a trusted user can access.
Smrity Dec 03 '15 at 5:10 2015-12-03 05:10
source share