Questions tagged [authentication]

A process of proving that an entity (commonly a user or organization) is who they claim to be, or who they were previously identified as being. Authentication does not guarantee that particular entity's identity absolutely, it just proves that they are the same agent that has previously successfully asserted their identity. There are three factors (types) of authentication, and a particular authentication process may combine two or more different factors.

Authentication is critical to systems security. It is the mechanism an authoritative system uses to validate a given entity's asserted identity (who they claim to be) is the same as that entity's stored credentials. Credentials must be previously stored for an entity either by the authoritative system, or by another trusted system, before authentication can occur.

Authentication is commonly used in real life in a number of different scenarios, for example a national border agent confirming a person's identity using a passport.

Authentication usually requires the entity being authenticated to produce one or more tokens. These tokens are then used, possibly alongside other properties or characteristics of the entity, to confirm their identity. An example of an authentication token is a password. These tokens can fall into three broad categories, or factors:

  • Something you know. This is the most commonly used authentication factor in electronic systems. It is most commonly implemented as a password or PIN (personal identification number). This is also the most commonly misused authentication factor. Many system require a secondary security question, such as your mother's maiden name, place you were born in or other such trivia. These all belong to this single factor, thus systems can as as many questions as they like and they are still single factor authentication; all the answers are something the entity would know.
  • Something you have. This is most commonly implemented as a formula number generator (like an RSA Key Fob) or a digital certificate (which can be stored on a smart card or less securely as a simple file on a computer). The Key Fobs, Smart Cards, and SSL Certificates are the most commonly used forms of this factor.
  • Something you are. This is commonly known as biometric security. Fingerprints and iris scans are the most common form when used with electronic access systems. Fingerprints and DNA are the most commonly used in law enforcement.

It should be noted that some security experts have reservations about the factor categories. Specifically all authentication factors are fed into the authentication mechanism as computerized information and are therefore subject to the same possible tampering or forgery as any other information. Digital Certificates for example are essentially passwords that are so long a normal person would never memorize it; it must be stored on a medium (thus termed "something you have"). Similarly anyone who has seen a spy movie has undoubtedly seen a fictional character copy a fingerprint or fake an iris scan. This is possible because the authentication mechanism is reliant on a digital reproduction of the physical item; a digital representation that can be duplicated.

There are many indirect authentication schemes as well. Kerberos is one of the most popular, you authenticate against a central store, which then gives you a token. The token can then be used to grant you access to other systems in lieu of the original authentication mechanism.

Authentication should not be confused with Authorization, which involves granting rights to a specific entity. Authorization schemes are commonly dependent on Authentication to ensure security, but are not the same.

See Wikipedia for more information about Authentication and Security.

2218 questions
7
votes
2 answers

Same RSA key on multiple PCs

Can I use my RSA private key on multiple computers i.e. my desktop and laptop. Or do I have to create a unique key for each computer I own, and add their respective public keys to necessary servers/programs.
Tom
  • 195
  • 4
7
votes
1 answer

Jenkins User Credentials Not Showing In Project

So I have Jenkins-CI running with the plugins: Credentials Credentials Binding Git First what I did in order to authenticate Git with the remote repository, is I added credentials to the server to the Global scope with no domain. However, this…
Qyriad
  • 71
  • 1
  • 3
7
votes
4 answers

How do accept multiple authentication options in Apache?

I want to protect a path in my VirtualHost but allow users a variety of authentication options (e.g. mod-auth-cas, mod-auth-openid and mod-auth-digest.) How do I set up the virtual host definition to allow multiple auth-types for the same location?
James A. Rosen
  • 511
  • 3
  • 9
  • 19
7
votes
5 answers

PBIS Open AD authentication stops working on ubuntu with errors: "user accout has expired" and "is your account locked?"

We have been using PowerBroker Identity Services Open to authenticate active directory users from ubuntu hosts successfully for six months. Recently AD authentication stopped working on several workstations after users performed an apt-get upgrade…
Peter M
  • 973
  • 2
  • 15
  • 27
7
votes
3 answers

Apache 2.4 + SVN authz authentication with mixed authenticated/anonymous access

I'm using Apache 2.4, and I wish to use it without mod_access_compat. I'm trying to serve SVN repositories, with access control handled by mod_authz_svn. I want some repos or locations within repos to have read-only anonymous access. I want other…
antiduh
  • 310
  • 1
  • 3
  • 14
7
votes
1 answer

Is there a way for iSeries AS400 sessions not get disconnected or locked

I have to deal with this in a daily basis: For some reason, maybe due to input error, our users get their sessions disconnected from our iSeries AS400 and I have to manually enter the command: WRKCFGSTS *DEV SESSIONAME and change it to status…
peppp
  • 81
  • 2
  • 7
7
votes
7 answers

will hosting provider have access to my dedicated server?

I am looking to buy a dedicated server for my web application.But I am concerned about security to my application code and who can access to my server even dedicated server.As hosting provider provides me pre-installed OS I have concern on hosting…
Ashwin Mekala
  • 157
  • 1
  • 2
  • 8
7
votes
1 answer

Samba standalone server using LDAP for authentication: SID mismatch

I'm trying to get my new samba server running for days now and I start losing my mind over not figuring out what I'm doing wrong. Here's my setup: OpenLDAP 2.4.21 server with ~15 groups and >100 users, all having a unix and a samba password stored…
Phil
  • 81
  • 1
  • 1
  • 4
7
votes
2 answers

Can a Mac with OS X 10.5 (Leopard) authenticate with a Windows 2008 domain?

I would like to have my MacBook Pro authenticate against Active Directory running on Windows 2008. A couple of years ago I tried to set this up between OS X 10.4 and Windows 2003 but I wasn't successful. A detailed step-by-step guide and a list of…
Brian Lyttle
  • 1,757
  • 1
  • 17
  • 17
7
votes
1 answer

WPA2 Enterprise without a Client-End Certificate

This question is practically identical to this question, but the difference being that the authentication server is freeRADIUS on Ubuntu and the access-points are DD-WRT. Additionally, I would like to know if there is any risk to disabling TTLS…
Seanny123
  • 370
  • 3
  • 15
7
votes
3 answers

Setting up SSL with 389 Directory Server for LDAP authentication

I've got 389 Directory Server running on RHEL 5 with groups, users, posix etc. RHEL clients are authenticating users with LDAP - no problems, everything works perfect, but passwords are sent in plaintext and are visible with network sniffer. So,…
GioMac
  • 4,544
  • 4
  • 27
  • 41
7
votes
4 answers

SSH still asks for password even after adding key to authorized_keys

Here are the steps I did on my local computer: ssh-keygen -t rsa cat ~/.ssh/id_rsa | ssh root@remotehost.com -p 1234 "cat > ~/.ssh/authorized_keys" When I do a ssh root@remotehost.com -p 1234 it still asks for the password :o root@remotehost.com's…
Jürgen Paul
  • 1,265
  • 4
  • 15
  • 22
7
votes
3 answers

How to use PAM to limit failed login attempts by IP?

I'm working through a process of hardening my server security against the daily hacking attempts that arise the moment you attach a server to an IP and give it a domain name. I get anywhere from 1 to 8 brute force attempts daily to access SSH as…
Philip Couling
  • 1,682
  • 1
  • 19
  • 37
7
votes
2 answers

How to use nginx PAM module?

I would like to use nginx PAM module to authenticate a site with existing users on a FreeBSD system. I tried to use pam_unix.so, but no luck. It's just not let me in with my usr/psw pair. :( nginx conf: location / { root html; …
noirello
  • 83
  • 1
  • 1
  • 6
7
votes
3 answers

Multiples authentication methods for Postgresql

I presently use "md5" authentication for access from the lan: host all all 192.168.1.0/24 md5 I want to add ldap authentication method, so I added this line before: host all all 192.168.1.0/24 ldap…
Francis
  • 481
  • 2
  • 7
  • 19