Here’s the difference between Authentication and Authorization in a table format with 8 points:

Feature Authentication Authorization
1. Definition Verifying the identity of the user/system Determining what actions/resources the user can access
2. Goal To answer: Who is the user? To answer: What can the authenticated user do?
3. Occurrence Occurs first, before authorization Occurs second, after authentication
4. Focus Identity verification Access control and permissions
5. Method Password, biometrics, PIN, security tokens Access control lists, roles, permissions
6. Example Logging in with a username and password Accessing a specific file or modifying data based on user role
7. Scope Validates the identity of the user Validates what the authenticated user can do with the system or resource
8. Security Layer Provides the first layer of security (identity check) Provides the second layer of security (defining allowed actions)

This table highlights 8 distinct points of difference between authentication and authorization.