{"id":16078,"date":"2020-09-24T20:11:16","date_gmt":"2020-09-24T23:11:16","guid":{"rendered":"https:\/\/www.kaspersky.com.br\/blog\/?p=16078"},"modified":"2020-09-30T18:02:30","modified_gmt":"2020-09-30T21:02:30","slug":"identification-authentication-authorization-difference","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.br\/blog\/identification-authentication-authorization-difference\/16078\/","title":{"rendered":"Como diferenciar identifica\u00e7\u00e3o, autentica\u00e7\u00e3o e autoriza\u00e7\u00e3o\u00a0"},"content":{"rendered":"<p><span data-contrast=\"none\">Acontece com cada um de n\u00f3s<\/span><span data-contrast=\"none\">,<\/span><span data-contrast=\"none\">\u00a0todos os dias. Somos constantemente identificados, autenticados e autorizados por v\u00e1rios sistemas. E ainda, muitas pessoas confundem o significado dessas palavras, muitas vezes usando os termos\u00a0<\/span><i><span data-contrast=\"none\">identifica\u00e7\u00e3o <\/span><\/i><span data-contrast=\"none\">ou\u00a0<\/span><i><span data-contrast=\"none\">autoriza\u00e7\u00e3o<\/span><\/i><span data-contrast=\"none\"> quando, na verdade,<\/span><span data-contrast=\"none\">\u00a0est\u00e3o falando sobre\u00a0<\/span><i><span data-contrast=\"none\">autentica\u00e7\u00e3o<\/span><\/i><span data-contrast=\"none\">.<\/span><\/p>\n<p><span data-contrast=\"none\">Isso n\u00e3o \u00e9 <\/span><span data-contrast=\"none\">um problema<\/span><span data-contrast=\"none\">, desde que seja apenas uma conversa di\u00e1ria e ambos os lados entendam\u00a0<\/span><span data-contrast=\"none\">sobre o<\/span><span data-contrast=\"none\">\u00a0que est\u00e3o falando. No entanto, \u00e9 sempre melhor saber o significado das palavras que voc\u00ea usa\u00a0<\/span><span data-contrast=\"none\">pois<\/span><span data-contrast=\"none\">, mais cedo ou mais tarde, voc\u00ea encontrar\u00e1 um geek que o deixar\u00e1 louco com esclarecimentos, seja autoriza\u00e7\u00e3o versus autentica\u00e7\u00e3o,\u00a0<\/span><span data-contrast=\"none\">ou seja, l\u00e1 qual conceito a pessoa vai tentar explicar.<\/span><span data-ccp-props='{\"469777462\":[560,1120,1680,2240,2800,3360,3920,4480,5040,5600,6160,6720,7280,7840,8400,8960,9132],\"469777927\":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],\"469777928\":[1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1]}'>\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Ent\u00e3o, o que significam os termos <\/span><i><span data-contrast=\"none\">identifica\u00e7\u00e3o<\/span><\/i><span data-contrast=\"none\">,\u00a0<\/span><i><span data-contrast=\"none\">autentica\u00e7\u00e3o<\/span><\/i><span data-contrast=\"none\">\u00a0e\u00a0<\/span><i><span data-contrast=\"none\">autoriza\u00e7\u00e3o<\/span><\/i><span data-contrast=\"none\">\u00a0e como os processos diferem uns dos outros? Primeiro, vamos consultar a Wikipedia:<\/span><span data-ccp-props='{\"469777462\":[560,1120,1680,2240,2800,3360,3920,4480,5040,5600,6160,6720,7280,7840,8400,8960,9132],\"469777927\":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],\"469777928\":[1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1]}'>\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\u2022\" data-font=\"\" data-listid=\"1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"none\">\u201cIdentifica\u00e7\u00e3o<\/span><\/b><span data-contrast=\"none\">\u00a0<\/span><span data-contrast=\"none\">\u00e9 o ato de indicar a identidade de uma pessoa ou coisa\u201d<\/span><span data-contrast=\"none\">.<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\u2022\" data-font=\"\" data-listid=\"1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">\u201c<\/span><b><span data-contrast=\"none\">Autentica\u00e7\u00e3o <\/span><\/b><span data-contrast=\"none\">\u00e9 o ato de provar a identidade [\u2026] de um usu\u00e1rio do sistema de <\/span><span data-contrast=\"none\">computador \u201d <\/span><span data-contrast=\"none\">(por exemplo, comparando a senha inserida com a senha armazenada no banco de dados).<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\u2022\" data-font=\"\" data-listid=\"1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"none\">\u201c<\/span><b><span data-contrast=\"none\">Autoriza\u00e7\u00e3o<\/span><\/b><span data-contrast=\"none\">\u00a0\u00e9 a fun\u00e7\u00e3o de especificar direitos\/privil\u00e9gios de acesso aos recursos.\u201d<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"none\">D\u00e1 para<\/span><span data-contrast=\"none\">\u00a0ver por que as pessoas que n\u00e3o est\u00e3o realmente familiarizadas com os conceitos podem confundi-los.<\/span><span data-ccp-props='{\"469777462\":[560,1120,1680,2240,2800,3360,3920,4480,5040,5600,6160,6720,7280,7840,8400,8960,9132],\"469777927\":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],\"469777928\":[1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1]}'>\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"none\">Usando guaxinins para explicar identifica\u00e7\u00e3o, autentica\u00e7\u00e3o e autoriza\u00e7\u00e3o<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h2>\n<p>P<span data-contrast=\"none\">ara <\/span><span data-contrast=\"none\">ficar mais simples<\/span><span data-contrast=\"none\">, vamos usar um exemplo. Digamos que um usu\u00e1rio deseja fazer login em sua conta do Google. O Google funciona bem como exemplo porque seu processo de login \u00e9 dividido em v\u00e1rias etapas b\u00e1sicas<\/span><span data-contrast=\"none\">. \u00c9 mais ou menos assim<\/span><span data-contrast=\"none\">:<\/span><span data-ccp-props='{\"469777462\":[560,1120,1680,2240,2800,3360,3920,4480,5040,5600,6160,6720,7280,7840,8400,8960,9132],\"469777927\":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],\"469777928\":[1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1]}'>\u00a0<\/span><span data-ccp-props='{\"469777462\":[560,1120,1680,2240,2800,3360,3920,4480,5040,5600,6160,6720,7280,7840,8400,8960,9132],\"469777927\":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],\"469777928\":[1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1]}'>\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\u2022\" data-font=\"Helvetica Neue\" data-listid=\"3\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">Primeiro, o sistema pede um login. O usu\u00e1rio insere um e o sistema o reconhece como um login real. Isso \u00e9 <\/span><b><span data-contrast=\"none\">identifica\u00e7\u00e3o<\/span><\/b><span data-contrast=\"none\">.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li><span data-contrast=\"none\"> O Google ent\u00e3o pede uma senha. O usu\u00e1rio a fornece e, se a senha inserida corresponder \u00e0 senha armazenada, o sistema concorda que o usu\u00e1rio realmente parece ser real. Esta \u00e9 a<\/span><span data-contrast=\"none\">\u00a0<\/span><a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/authentication\/\" target=\"_blank\" rel=\"noopener\"><b><span data-contrast=\"none\">autentica\u00e7\u00e3o<\/span><\/b><\/a><span data-contrast=\"none\">.<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\u2022\" data-font=\"Helvetica Neue\" data-listid=\"3\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"none\">Na maioria dos casos, o Google tamb\u00e9m pede um c\u00f3digo de verifica\u00e7\u00e3o \u00fanico<\/span><span data-contrast=\"none\">, por<\/span><span data-contrast=\"none\">\u00a0uma mensagem de texto ou aplicativo autenticador. Se o usu\u00e1rio tamb\u00e9m inserir isso corretamente, o sistema finalmente concordar\u00e1 que ele ou ela \u00e9 o propriet\u00e1rio<\/span><span data-contrast=\"none\">(a)<\/span><span data-contrast=\"none\">\u00a0real da conta. Esta \u00e9 a\u00a0<\/span><a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/two-factor-authentication\/\" target=\"_blank\" rel=\"noopener\"><b><span data-contrast=\"none\">autentica\u00e7\u00e3o de dois fatores<\/span><\/b><\/a><span data-contrast=\"none\">.<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\u2022\" data-font=\"Helvetica Neue\" data-listid=\"3\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">Por fim, o sistema d\u00e1 ao usu\u00e1rio o direito de ler as mensagens em sua caixa de entrada e outros<\/span><span data-contrast=\"none\">\u00a0servi\u00e7os<\/span><span data-contrast=\"none\">. Esta \u00e9 a<\/span> <a href=\"https:\/\/encyclopedia.kaspersky.ru\/glossary\/authorization\/\" target=\"_blank\" rel=\"noopener\"><b><span data-contrast=\"none\">autoriza\u00e7\u00e3o<\/span><\/b><\/a><span data-contrast=\"none\">.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-ccp-props='{\"469777462\":[560,1120,1680,2240,2800,3360,3920,4480,5040,5600,6160,6720,7280,7840,8400,8960,9132],\"469777927\":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],\"469777928\":[1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1]}'>\u00a0<\/span><span data-contrast=\"none\">A autentica\u00e7\u00e3o sem identifica\u00e7\u00e3o pr\u00e9via n\u00e3o faz sentido; seria in\u00fatil come\u00e7ar a verificar antes que o sistema soubesse de quem \u00e9 a autenticidade\u00a0<\/span><span data-contrast=\"none\">que deve ser verificado<\/span><span data-contrast=\"none\">.\u00a0<\/span><span data-contrast=\"none\">A apresenta\u00e7\u00e3o \u00e9 o primeiro passo.<\/span><span data-ccp-props='{\"469777462\":[560,1120,1680,2240,2800,3360,3920,4480,5040,5600,6160,6720,7280,7840,8400,8960,9132],\"469777927\":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],\"469777928\":[1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1]}'>\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Na mesma linha, identifica\u00e7\u00e3o sem autentica\u00e7\u00e3o seria uma tolice. Qualquer pessoa pode inserir qualquer login existente no banco de dados \u2013 o sistema <\/span><span data-contrast=\"none\">precisaria<\/span><span data-contrast=\"none\">\u00a0da senha. Mas algu\u00e9m pode dar uma espiada na senha ou apenas adivinh\u00e1-la. Pedir mais provas que apenas o usu\u00e1rio real pode ter, como um c\u00f3digo de verifica\u00e7\u00e3o \u00fanico, \u00e9 melhor.<\/span><span data-ccp-props='{\"469777462\":[560,1120,1680,2240,2800,3360,3920,4480,5040,5600,6160,6720,7280,7840,8400,8960,9132],\"469777927\":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],\"469777928\":[1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1]}'>\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Em contraste, a autoriza\u00e7\u00e3o sem identifica\u00e7\u00e3o, <\/span><span data-contrast=\"none\">deixando apenas a\u00a0<\/span><span data-contrast=\"none\">autentica\u00e7\u00e3o, \u00e9 perfeitamente poss\u00edvel. Por exemplo, voc\u00ea pode fornecer acesso p\u00fablico ao seu documento no Google Drive, para que ele esteja dispon\u00edvel para qualquer pessoa. Nesse caso, voc\u00ea poder\u00e1 ver um aviso informando que seu documento est\u00e1 sendo visualizado por um\u00a0<\/span><span data-contrast=\"none\">\u201c<\/span><span data-contrast=\"none\">guaxinim an\u00f4nimo<\/span><span data-contrast=\"none\">\u201d (um dos \u201canimais an\u00f4nimos\u201d utilizados pelo Google<\/span><span data-contrast=\"none\">\u00a0para diferenciar usu\u00e1rios n\u00e3o identificados que estejam acessando um arquivo simultaneamente)<\/span><span data-contrast=\"none\">. Embora o guaxinim\u00a0<\/span><span data-contrast=\"none\">n\u00e3o seja identificado<\/span><span data-contrast=\"none\">, o sistema o autorizou \u2013 ou seja, concedeu a ele o direito de ver o documento.<\/span><span data-ccp-props='{\"469777462\":[560,1120,1680,2240,2800,3360,3920,4480,5040,5600,6160,6720,7280,7840,8400,8960,9132],\"469777927\":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],\"469777928\":[1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1]}'>\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">No entanto, se voc\u00ea tivesse concedido o direito de leitura apenas a determinados usu\u00e1rios, o <\/span><span data-contrast=\"none\">\u201c<\/span><span data-contrast=\"none\">guaxinim<\/span><span data-contrast=\"none\">\u201c<\/span><span data-contrast=\"none\">\u00a0teria que ser identificado (fornecendo seu login) e, em seguida, autenticado (fornecendo a senha e um c\u00f3digo de verifica\u00e7\u00e3o \u00fanico) para obter o direito de ler o documento (autoriza\u00e7\u00e3o).<\/span><span data-ccp-props='{\"469777462\":[560,1120,1680,2240,2800,3360,3920,4480,5040,5600,6160,6720,7280,7840,8400,8960,9132],\"469777927\":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],\"469777928\":[1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1]}'>\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Quando se trata de ler o conte\u00fado de sua caixa de correio, o Google nunca autorizar\u00e1 um <\/span><span data-contrast=\"none\">\u201c<\/span><span data-contrast=\"none\">guaxinim an\u00f4nimo<\/span><span data-contrast=\"none\">\u201c<\/span><span data-contrast=\"none\">\u00a0a ler suas mensagens.\u00a0<\/span><span data-contrast=\"none\">Ele\u00a0<\/span><span data-contrast=\"none\">teria que se apresentar como voc\u00ea, com\u00a0<\/span><span data-contrast=\"none\">seu login e senha, momento em que n\u00e3o seria mais um guaxinim an\u00f4nimo<\/span><span data-contrast=\"none\">.<\/span><span data-contrast=\"none\">\u00a0O Google o identificaria como voc\u00ea.<\/span><span data-ccp-props='{\"469777462\":[560,1120,1680,2240,2800,3360,3920,4480,5040,5600,6160,6720,7280,7840,8400,8960,9132],\"469777927\":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],\"469777928\":[1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1]}'>\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Ent\u00e3o, agora voc\u00ea sabe de que maneira a identifica\u00e7\u00e3o \u00e9 diferente da autentica\u00e7\u00e3o e<\/span><span data-contrast=\"none\">\u00a0da<\/span><span data-contrast=\"none\">\u00a0autoriza\u00e7\u00e3o. Mais um ponto importante: a autentica\u00e7\u00e3o \u00e9 talvez o processo-chave em termos de seguran\u00e7a da sua conta. Se voc\u00ea estiver usando uma senha fraca para autentica\u00e7\u00e3o, um\u00a0<\/span><span data-contrast=\"none\">\u201c<\/span><span data-contrast=\"none\">guaxinim<\/span><span data-contrast=\"none\">\u201c<\/span><span data-contrast=\"none\">\u00a0pode sequestrar sua conta. Portanto:<\/span><span data-ccp-props='{\"469777462\":[560,1120,1680,2240,2800,3360,3920,4480,5040,5600,6160,6720,7280,7840,8400,8960,9132],\"469777927\":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],\"469777928\":[1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1]}'>\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\u2022\" data-font=\"Helvetica Neue\" data-listid=\"3\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">Crie senhas\u00a0<\/span><a href=\"https:\/\/www.kaspersky.com.br\/blog\/strong-password-day\/11398\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">fortes<\/span><\/a><span data-contrast=\"none\">\u00a0e\u00a0<\/span><a href=\"https:\/\/www.kaspersky.com\/blog\/never-reuse-passwords-story\/24808\/\" target=\"_blank\" rel=\"noopener nofollow\"><span data-contrast=\"none\">\u00fanicas<\/span><\/a><span data-contrast=\"none\">\u00a0para todas as suas contas.<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\u2022\" data-font=\"Helvetica Neue\" data-listid=\"3\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">Se voc\u00ea tem dificuldades de lembrar suas senhas<\/span><span data-contrast=\"none\">,\u00a0<\/span><span data-contrast=\"none\">um<\/span><span data-contrast=\"none\"> <a href=\"https:\/\/www.kaspersky.com.br\/password-manager?icid=br_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">gerenciador\u00a0de senhas<\/a><\/span><span data-contrast=\"none\">\u00a0<\/span><span data-contrast=\"none\">pode ajudar<\/span><span data-contrast=\"none\">.\u00a0<\/span><span data-contrast=\"none\">Ele tamb\u00e9m<\/span><span data-contrast=\"none\">\u00a0\u00e9 \u00fatil<\/span><span data-contrast=\"none\">\u00a0gerando novas senhas.<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\u2022\" data-font=\"Helvetica Neue\" data-listid=\"3\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"none\">Ative a autentica\u00e7\u00e3o de dois fatores, com <\/span><a href=\"https:\/\/www.kaspersky.com.br\/blog\/2fa-practical-guide\/11223\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">c\u00f3digos de verifica\u00e7\u00e3o \u00fanicos em mensagens de texto ou em um aplicativo autenticador<\/span><\/a><span data-contrast=\"none\">, para cada servi\u00e7o compat\u00edvel. Caso contr\u00e1rio, algum\u00a0<\/span><span data-contrast=\"none\">\u201c<\/span><span data-contrast=\"none\">guaxinim an\u00f4nimo<\/span><span data-contrast=\"none\">\u201c<\/span><span data-contrast=\"none\">\u00a0que colocou as patas em sua senha poder\u00e1 ler sua correspond\u00eancia secreta ou fazer algo ainda mais desagrad\u00e1vel.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-ccp-props='{\"469777462\":[560,1120,1680,2240,2800,3360,3920,4480,5040,5600,6160,6720,7280,7840,8400,8960,9132],\"469777927\":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],\"469777928\":[1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1]}'> <input type=\"hidden\" class=\"category_for_banner\" value=\"kpm\"><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Explicamos\u00a0como a identifica\u00e7\u00e3o, autoriza\u00e7\u00e3o e autentica\u00e7\u00e3o diferem e por que\u00a0a autentica\u00e7\u00e3o de dois fatores\u00a0\u00e9 necess\u00e1ria.\u00a0<\/p>\n","protected":false},"author":675,"featured_media":16079,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1028],"tags":[2382,374,1536,2442,2441,1402,53,102],"class_list":{"0":"post-16078","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-privacy","8":"tag-a2f","9":"tag-autenticacao","10":"tag-autenticacao-de-dois-fatores","11":"tag-autorizacao","12":"tag-identificacao","13":"tag-kaspersky-password-manager","14":"tag-privacidade","15":"tag-senhas"},"hreflang":[{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/identification-authentication-authorization-difference\/16078\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/identification-authentication-authorization-difference\/21926\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/identification-authentication-authorization-difference\/17402\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/identification-authentication-authorization-difference\/10669\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/identification-authentication-authorization-difference\/23338\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/identification-authentication-authorization-difference\/21531\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/identification-authentication-authorization-difference\/20152\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/identification-authentication-authorization-difference\/23914\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/identification-authentication-authorization-difference\/22886\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/identification-authentication-authorization-difference\/29123\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/identification-authentication-authorization-difference\/8851\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/identification-authentication-authorization-difference\/37143\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/identification-authentication-authorization-difference\/15708\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/identification-authentication-authorization-difference\/13993\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/identification-authentication-authorization-difference\/25229\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/identification-authentication-authorization-difference\/11999\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/identification-authentication-authorization-difference\/29254\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/identification-authentication-authorization-difference\/26124\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/identification-authentication-authorization-difference\/22896\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/identification-authentication-authorization-difference\/28219\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/identification-authentication-authorization-difference\/28053\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.br\/blog\/tag\/privacidade\/","name":"privacidade"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.br\/blog\/wp-json\/wp\/v2\/posts\/16078","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.br\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.br\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.br\/blog\/wp-json\/wp\/v2\/users\/675"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.br\/blog\/wp-json\/wp\/v2\/comments?post=16078"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com.br\/blog\/wp-json\/wp\/v2\/posts\/16078\/revisions"}],"predecessor-version":[{"id":16080,"href":"https:\/\/www.kaspersky.com.br\/blog\/wp-json\/wp\/v2\/posts\/16078\/revisions\/16080"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.br\/blog\/wp-json\/wp\/v2\/media\/16079"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.br\/blog\/wp-json\/wp\/v2\/media?parent=16078"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.br\/blog\/wp-json\/wp\/v2\/categories?post=16078"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.br\/blog\/wp-json\/wp\/v2\/tags?post=16078"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}