Making Authentication and Authorisation Clear – and why it matters!

Skyline view of Paris with Eiffel Tower in background.

In this guest blog post, Ben Woelk, author of our new Cybersecurity for Communicators course, discusses two foundational cybersecurity concepts—authentication and authorisation, and how you can simplify their complexity.

Ben Woelk profile photo

As communicators and technical communicators, you play a key role in translating complex organisational processes into actionable, understandable information. This role is critical in cybersecurity.


Authentication: Proving Your Digital Identity

Authentication is the process of verifying a user’s, device’s, or process’ identity before granting any access.

Think of it as the digital equivalent of showing a passport or ID badge to gain entry to a secure building. It answers the question: “Are you who you claim to be?”

Common authentication methods you may need to explain include:

  • Passwords/Passphrases:
    Something you know

    For many years, cybersecurity professionals emphasized the need for complex passwords. The industry has shifted to guidance to use longer, memorable passphrases over complex, short passwords. For example, “ItwasaDark215&StormyNight” is far stronger than “stormy”. (For a fun demonstration of this, enter both passwords into a password strength checker, such as the one provided by BitWarden, https://bitwarden.com/password-strength/)

  • Multi-Factor Authentication (MFA):
    Something you know + something you have

    Such as a one-time code on a mobile device or a physical security key. You should use MFA on every account where it’s available. MFA isn’t perfect, but it is the single biggest defense against having your password compromised.

  • Biometric Authentication:
    Something you are
    Fingerprint, facial recognition, etc.

  • Single Sign-On (SSO):
    Using one set of credentials to securely access multiple, different systems, streamlining the user experience.

Tip for Communicators:
When writing instructions or policies, be clear about which authentication method is mandatory and, most importantly: why. Using plain language and real-world analogies helps users immediately grasp the importance of strong security measures.


Authorisation: What You Are Allowed to Do

Authorisation determines precisely what actions a verified user can perform or what information they can access after their identity has been authenticated.

If authentication is showing your ID at the gate, authorisation is the security guard checking the permissions on your ID to see which specific rooms or floors your badge allows you to enter. It answers the question: “What am I permitted to do?”

Key Authorisation Models to understand:

  • Role-Based Access Control (RBAC):

    This is a preferred model. Permissions are assigned based on a user’s role within the organisation (for example: Editor, Viewer, Admin).

  • Discretionary Access Control (DAC):

    The owner of the resource or file decides who can access it and what they can do.

  • Mandatory Access Control (MAC):

    The system strictly enforces access rules based on predefined security labels, often used in highly regulated or sensitive environments.

Tip for Technical Communicators:
When documenting systems or software, clarify who has access to what, and why. Tables, flowcharts, or simple diagrams showing roles and their corresponding permissions are invaluable for clarity and compliance.


Key Takeaways for Translating Cyber Concepts

  • Authentication = Who you are. (Proof of Identity)

  • Authorisation = What you can do. (Granted Permissions)

  • Always use plain language and universally relatable examples to bridge the gap between cybersecurity experts and end-users.

  • Strong authentication and clear authorisation policies are fundamental to protecting users, customers, and organisations across the globe.

Interested in learning more on this growing need? The Firehead Training Academy has a new Cybersecurity for Communicators course by Cybersecurity expert Ben Woelk that can start you on your journey to creating secure communication in the digital age.

Our next cohort starts 14 January and goes once a week on Wednesdays until 18 February.

You can also download our free resource Cybersecurity Checklist for Technical Communicators by Ben Woelk.

Contact us here with any questions or if we can help you at all.

Hope to see you soon!

Firehead. Visionaries of potential.

Leave the first comment

CJ Walker

Related Posts

Call to action

Why does AI want to know what’s in your sandwich?

Jerry Bartlett of Content Pro Tech Ltd poses a classification question that brings semantics home in this guest blog post. Enjoy! Is a hotdog a sandwich? And what the answer got to do with AI or technical communication? My answer…...

CJ Walker

Happy 2026! And a Question

I hope your long winter’s nap was enjoyable and your festivities brought you close to family and loved ones this season. .I hope you’re happy to be back at it—at least a little—in 2026. All of us here at Firehead…...

CJ Walker

Unlocking New Career Paths: How Knowledge Graphs Empower Technical Communicators

Part 4 of the Knowledge Organisation Systems Chain in our Skills for Modern Technical Communicators series In the KOS ladder—raw data → structured data → vocabularies/taxonomies → ontologies → knowledge graphs → semantically‑enabled services, we’re stepping from the ontology (the…...

CJ Walker