Authentication verifies "who you are" - confirming the identity of a user or system.
- Examples: Username/password, biometrics, certificates
Authorization determines "what you can do" - granting or denying access to resources based on identity.
- Examples: Role-based access control (RBAC), permissions, ACLs
Example flow:
- User provides credentials (authentication)
- System verifies credentials
- System checks user's permissions for requested resource (authorization)
- Grant or deny access based on permissions