User Authentication

Guide to Data Warehousing and Business Intelligence

There are two type of Internet Applications:  authenticated and unauthenticated.

An authenticated application is one that requires a login ID and password.  An unauthenticated application allows visitors to use the Internet application without needing to log in.

Authenticated applications can generate much business intelligence about customers, their preferences, interests and purchases.

To obtain a user ID and password, web users are required to register. They are normally required to provide an email address, name, birthdate and additional profile information such as hobbies and interest.

This personal profile data is stored in a database that can be integrated with web usage data from the web application and/or web server logs.

Web Analytics

Sometimes users aren't required to submit a registration over the Internet.  Using data from their internal corporate data, the business sends a login ID and password to their customers.  Each time the login ID is used, data is collected about the Internet session.

Whether or not a visitor is authenticated, most Internet Applications retain statistics on application usage such as how the visitor navigated through the application.  This is required to identify technical issues and usage patterns.

By leveraging data available from authenticated applications, subsequent visits can be customized for users.

Next Page