login (command)
   HOME

TheInfoList



OR:

In computer security, logging in (or logging on, signing in, or signing on) is the process by which an individual gains access to a computer system by identifying and
authenticating Authentication (from ''authentikos'', "real, genuine", from αὐθέντης ''authentes'', "author") is the act of proof (truth), proving an Logical assertion, assertion, such as the Digital identity, identity of a computer system user. In ...
themselves. The
user Ancient Egyptian roles * User (ancient Egyptian official), an ancient Egyptian nomarch (governor) of the Eighth Dynasty * Useramen, an ancient Egyptian vizier also called "User" Other uses * User (computing), a person (or software) using an ...
credentials are typically some form of username and a matching password, and these credentials themselves are sometimes referred to as ''a'' login. In practice, modern secure systems often require a second factor such as email or
SMS Short Message/Messaging Service, commonly abbreviated as SMS, is a text messaging service component of most telephone, Internet and mobile device systems. It uses standardized communication protocols that let mobile devices exchange short text ...
confirmation for extra security. Social login allows a user to use existing user credentials from a
social networking service A social networking service or SNS (sometimes called a social networking site) is an online platform which people use to build social networks or social relationships with other people who share similar personal or career content, interests, act ...
to sign in to or create an account on a new website. When access is no longer needed, the user can log out, log off, sign out or sign off.


Procedure

Logging in is usually used to enter a specific page, website or application, which trespassers cannot see. Once the user is logged in, the login token may be used to track what actions the user has taken while connected to the site. Logging out may be performed explicitly by the
user Ancient Egyptian roles * User (ancient Egyptian official), an ancient Egyptian nomarch (governor) of the Eighth Dynasty * Useramen, an ancient Egyptian vizier also called "User" Other uses * User (computing), a person (or software) using an ...
taking some actions, such as entering the appropriate command or clicking a website link label as such. It can also be done implicitly, such as by the user powering off their workstation, closing a web browser window, leaving a website, or not refreshing a website within a defined period. A login page may have a return
URL A Uniform Resource Locator (URL), colloquially termed as a web address, is a reference to a web resource that specifies its location on a computer network and a mechanism for retrieving it. A URL is a specific type of Uniform Resource Identifie ...
parameter, which specifies where to redirect back after logging in or out. For example, it is returnto= on this site. In the case of websites that use cookies to track sessions, when the user logs out, session-only cookies from that site will usually be deleted from the user's computer. In addition, the server invalidates any associations with the session, thereby making any session-handle in the user's cookie store useless. This feature comes in handy if the user is using a public computer or a computer that is using a public wireless connection. As a security precaution, one should not rely on implicit means of logging out of a system, especially not on a public computer; instead, one should explicitly log out and wait for the confirmation that this request has taken place. Logging out of a computer, when leaving it, is a common security practice preventing unauthorized users from tampering with it. There are also people who choose to have a password-protected screensaver set to activate after some period of inactivity, thereby requiring the user to re-enter their login credentials to unlock the screensaver and gain access to the system. There can be different methods of logging in that may be via image, fingerprints, eye scan, password (oral or textual input), etc.


History and etymology

The terms became common with the time sharing systems of the 1960s and
Bulletin Board System A bulletin board system (BBS), also called computer bulletin board service (CBBS), is a computer server running software that allows users to connect to the system using a terminal program. Once logged in, the user can perform functions such as ...
s (BBS) in the 1970s. Early home computers and personal computers did not generally require them until Windows NT, OS/2 and Linux in the 1990s. The noun ''login'' comes from the verb ''(to) log in'' and by analogy with the verb ''to clock in''. Computer systems keep a ''
log Log most often refers to: * Trunk (botany), the stem and main wooden axis of a tree, called logs when cut ** Logging, cutting down trees for logs ** Firewood, logs used for fuel ** Lumber or timber, converted from wood logs * Logarithm, in mathe ...
'' of users' access to the system. The term "log" comes from the chip log historically used to record distance traveled at sea and was recorded in a ship's log or
logbook A logbook (or log book) is a record used to record states, events, or conditions applicable to complex machines or the personnel who operate them. Logbooks are commonly associated with the operation of aircraft, nuclear plants, particle accelera ...
. To ''sign in'' connotes the same idea but is based on the analogy of manually signing a log book or
visitors book Visitor, in English and Welsh law, is an academic or ecclesiastical title. Visitor or Visitors may also refer to: Geography * Visitor (mountain), a mountain in eastern Montenegro * Lake Visitor, a mountain lake in eastern Montenegro Literature * ...
. While there is no agreed difference in meaning between the terms ''login'', ''logon'' and ''sign''-''in'', different technical communities tend to prefer one over another – Unix, Novell, Linux and Apple typically use ''login'', and Apple's
style guide A style guide or manual of style is a set of standards for the writing, formatting, and design of documents. It is often called a style sheet, although that term also has multiple other meanings. The standards can be applied either for gene ...
says ''"Users log in to a file server (not log on to)...".'' By contrast, Microsoft's style guides traditionally suggested the opposite and prescribed ''log on'' and ''logon''. In the past, Microsoft reserved ''sign-in'' to accessing the Internet,"Use log on or log on to... Do not use log in, login", 2004, ''Manual of Style for Technical Publications'', 3rd edition, p. 295, Microsoft.com. but from Windows 8 onward it has moved to the ''sign-in'' terminology for local authentication.


See also

* Computer security * Login session * Login spoofing * OpenID * Password *
Password policy A password policy is a set of rules designed to enhance computer security by encouraging users to employ strong passwords and use them properly. A password policy is often part of an organization's official regulations and may be taught as part o ...
*
Personal identification number A personal identification number (PIN), or sometimes redundantly a PIN number or PIN code, is a numeric (sometimes alpha-numeric) passcode used in the process of authenticating a user accessing a system. The PIN has been the key to facilitat ...
* /var/log/wtmp


References

{{Authority control Authentication methods User interfaces Computer access control