What is Authentication?

Authentication is the process by which a system verifies that someone or something truly is who or what it claims to be. It forms a first line of defence when accessing systems, applications and devices.

In OT networks, strong authentication is essential to prevent unauthorised access to systems such as SCADA, PLC or Engineering Station.


🧠 How does authentication work?

There are three main types of authentication factors:

  1. Something you know
  • Password, PIN, answer to a secret question
  1. Something you have
  • Token, smartcard, MFA app, badge
  1. Something you are
  • Biometrics such as fingerprints or facial recognition

Authentication methods:

  • Single-factor authentication (SFA) Only one type (e.g. username + password)

  • Multi-factor authentication (MFA) Two or more factors combined → significantly more secure

  • Certificate-based authentication Using digital certificates at device or user level


🏭 Authentication in industrial networks

  • Login to HMI or SCADA via username and password
  • MFA for remote access to OT via VPN or Jump Server
  • Use of badges or tokens for physical access to server rooms
  • 802.1X for device authentication on network ports
  • Digital certificates on OPC UA servers and clients
  • RADIUS or Active Directory for centralised authentication management

Authentication in OT must be both user-friendly and secure, with minimal impact on process continuity.


🔍 Authentication vs. authorisation

Aspect Authentication Authorisation
Purpose Who are you? What are you allowed to do?
Example MFA login on SCADA Read-only access to historical data
Order Always happens first Follows only after successful authentication
Mechanisms Password, token, certificate RBAC, ABAC, Group Policy

🔐 Security considerations

Weak authentication is often the root cause of OT incidents: no MFA, weak passwords, hardcoded credentials.


📌 In summary

Authentication protects industrial systems by verifying who is trying to gain access. In OT environments, it is crucial to combine authentication with robust access management, especially for remote administration and critical systems.