"Compromised Authentication
Establishing user identity is also of primary concern in distributed environments; otherwise, there can be little confidence in limiting privileges by user. For example, unless you have confidence in user authentication mechanisms, how can you be sure that user Scott connecting to Server B from Client B really is user Scott?"
"Compromised Authorization
You also need to have confidence in the way clients and servers are made known to one another over the network, so that you have assurance not only that user Scott is who he says he is, but that Client B and Client A are also what they claim to be."
Хоть убейте, не вижу разницы
