Authentication Authorization and Accounting: Definition, Examples


Authentication Authorization and Accounting, often known as AAA, is a system in network security that uses these three steps to control user access to network resources. Authentication verifies the identity of the user, Authorization determines the access rights depending on the user’s identity, and Accounting monitors the user’s activities on the network for audit or billing purposes. Together, these steps provide a robust framework for enforcing and tracking access control in a network.


Authentication: /ɔːˌθen.tɪˈkeɪ.ʃən/Authorization: /ˌɔːθəraɪˈzeɪʃn/Accounting: /əˈkaʊntɪŋ/

Key Takeaways


  1. Authentication: This is the process used to verify the identity of a user, device, or system. It usually involves a username and a password, but can include any form of verifying who or what you are. Its main purpose is to ensure that the user, device, or system is who or what it claims to be.
  2. Authorization: Once the authentication process is successful, authorization begins. This involves giving that user, device, or system permissions to access, modify or interact with certain resources. In other words, authorization determines what an authenticated user is allowed to do.
  3. Accounting: The accounting process keeps track of what the user does while they are authenticated and authorized. It records the services accessed by the user, the amount of system resources used, and the duration of the user’s activities. This information is valuable for managing and controlling system resources, as well as for auditing and billing purposes.



Authentication, Authorization, and Accounting (AAA) is a fundamental tech term crucial for managing user rights and tracking user activities in network systems. It is a framework that enhances the security of networks against unauthorized access. With authentication, the system verifies the user’s identity, ensuring that users are who they profess to be. Authorization, aligns with providing access rights and privileges to authenticated users, controlling the extent of system resources a user can access. Finally, accounting provides a way of recording user activities for audit and trending purposes, allowing a network to gather usage statistics for various reasons like billing, system diagnostics, or security review. AAA is thus vitally important as it builds a strong foundation for securing sensitive data and managing user access effectively in any networked environment.


Authentication, Authorization, and Accounting, collectively known as AAA, is a network security framework particularly important for establishing, setting up, and maintaining secure network interactions. One key function of AAA is to verify if the user or device is indeed who or what it claims to be, through a process known as “authentication”. This is typically accomplished by requesting and validating credentials like usernames and passwords. This step is critical as it acts as a gatekeeper, denying unauthorized users from even initiating further network interactions.Once the user or device has successfully passed the authentication stage, the next key function is “authorization”. This process determines what permissions or privileges the authenticated user or device has within the network, effectively limiting their actions to only what they are allowed to perform. The final “accounting” phase keeps a track of each user’s activities on the network. This information can be instrumental for audit trails, billing, usage-based costing, and an array of other purposes. Overall, AAA serves as a vital first line of defense for network security, playing a pivotal role in controlling access and maintaining the integrity, confidentiality, and availability of network resources.


1. **Banking Apps**: After entering your username and password (authentication), the system checks your access level to ensure you are permitted to conduct transactions, check balance etc., (authorization). The system also keeps a track of these operations to create an audit trail (accounting). 2. **Healthcare Records System**: When professionals such as doctors, nurses or receptionists access a patient’s record, they have to provide their identification details (authentication). Depending on their role in the healthcare system, they are allowed different levels of access, for example, a receptionist might not be able to alter medical records (authorization). Any change or access to the record is logged for future reference (accounting). 3. **Corporate Intranet**: Any employee in a corporation using the Intranet has to first log in using his unique ID and password (authentication). Once logged in, different employees have different access levels depending upon their role within the organization, for instance, an executive might have access to more files and data than an intern (authorization). The various activities within the Intranet by each employee are tracked and logged for creating accountability (accounting).

Frequently Asked Questions(FAQ)

**Q: What is Authentication Authorization and Accounting (AAA)?** A: Authentication Authorization and Accounting, often called “Triple A,” is a network security framework for controlling user access to computer resources and tracking user interactions. It forms a crucial aspect of network security management.**Q: What does the Authentication part signify in AAA?**A: Authentication is the process through which a system verifies the identity of a user trying to gain access. It usually requires something the user knows, like a password, or something the user has, such as a hardware token.**Q: What is Authorization in AAA?** A: Authorization refers to the level of network resources a user or client is granted after successful authentication. It determines what actions the authenticated user can perform, what files they can access, and the tasks they can execute.**Q: What does the Accounting aspect of AAA involve?**A: Accounting keeps track of the resources the user consumes during their access period. This could include the amount of data transmitted, services used, or the length of time connected. It plays a key role in report generation and capacity planning.**Q: How does AAA improve network security?**A: AAA improves network security by strictly controlling and tracking who can access a network and what they can do. This ensures that sensitive resources are accessible only to authorized users and monitors what those users do with their access.**Q: What role does AAA play in a corporate environment?**A: In a corporate environment, AAA ensures that employees and clients have access to the resources they need while keeping sensitive data secure. It helps apply role-based access, preventing unauthorized access to restricted resources.**Q: Can AAA be used with wireless networks?**A: Yes, AAA can be used with both wired and wireless networks. It is a critical component for managing security in any network and can be implemented in a variety of network environments.**Q: Are there specific protocols used in an AAA system?**A: Yes, there are several protocols for implementing AAA systems. Some of the most used protocols include RADIUS (Remote Authentication Dial-In User Service), Diameter, and TACACS+ (Terminal Access Controller Access-Control System Plus).

Related Technology Terms

  • Access Control
  • Multi-factor Authentication
  • Identity Verification
  • Role-Based Access Control (RBAC)
  • Audit Logs

Sources for More Information


About The Authors

The DevX Technology Glossary is reviewed by technology experts and writers from our community. Terms and definitions continue to go under updates to stay relevant and up-to-date. These experts help us maintain the almost 10,000+ technology terms on DevX. Our reviewers have a strong technical background in software development, engineering, and startup businesses. They are experts with real-world experience working in the tech industry and academia.

See our full expert review panel.

These experts include:


About Our Editorial Process

At DevX, we’re dedicated to tech entrepreneurship. Our team closely follows industry shifts, new products, AI breakthroughs, technology trends, and funding announcements. Articles undergo thorough editing to ensure accuracy and clarity, reflecting DevX’s style and supporting entrepreneurs in the tech sphere.

See our full editorial policy.

More Technology Terms

Technology Glossary

Table of Contents