Questions tagged [authentication]

A process of proving that an entity (commonly a user or organization) is who they claim to be, or who they were previously identified as being. Authentication does not guarantee that particular entity's identity absolutely, it just proves that they are the same agent that has previously successfully asserted their identity. There are three factors (types) of authentication, and a particular authentication process may combine two or more different factors.

Authentication is critical to systems security. It is the mechanism an authoritative system uses to validate a given entity's asserted identity (who they claim to be) is the same as that entity's stored credentials. Credentials must be previously stored for an entity either by the authoritative system, or by another trusted system, before authentication can occur.

Authentication is commonly used in real life in a number of different scenarios, for example a national border agent confirming a person's identity using a passport.

Authentication usually requires the entity being authenticated to produce one or more tokens. These tokens are then used, possibly alongside other properties or characteristics of the entity, to confirm their identity. An example of an authentication token is a password. These tokens can fall into three broad categories, or factors:

  • Something you know. This is the most commonly used authentication factor in electronic systems. It is most commonly implemented as a password or PIN (personal identification number). This is also the most commonly misused authentication factor. Many system require a secondary security question, such as your mother's maiden name, place you were born in or other such trivia. These all belong to this single factor, thus systems can as as many questions as they like and they are still single factor authentication; all the answers are something the entity would know.
  • Something you have. This is most commonly implemented as a formula number generator (like an RSA Key Fob) or a digital certificate (which can be stored on a smart card or less securely as a simple file on a computer). The Key Fobs, Smart Cards, and SSL Certificates are the most commonly used forms of this factor.
  • Something you are. This is commonly known as biometric security. Fingerprints and iris scans are the most common form when used with electronic access systems. Fingerprints and DNA are the most commonly used in law enforcement.

It should be noted that some security experts have reservations about the factor categories. Specifically all authentication factors are fed into the authentication mechanism as computerized information and are therefore subject to the same possible tampering or forgery as any other information. Digital Certificates for example are essentially passwords that are so long a normal person would never memorize it; it must be stored on a medium (thus termed "something you have"). Similarly anyone who has seen a spy movie has undoubtedly seen a fictional character copy a fingerprint or fake an iris scan. This is possible because the authentication mechanism is reliant on a digital reproduction of the physical item; a digital representation that can be duplicated.

There are many indirect authentication schemes as well. Kerberos is one of the most popular, you authenticate against a central store, which then gives you a token. The token can then be used to grant you access to other systems in lieu of the original authentication mechanism.

Authentication should not be confused with Authorization, which involves granting rights to a specific entity. Authorization schemes are commonly dependent on Authentication to ensure security, but are not the same.

See Wikipedia for more information about Authentication and Security.

2218 questions
7
votes
1 answer

Best practice for authenticating DMZ against AD in LAN

We have few customer facing servers in DMZ that also have user accounts , all accounts are in shadow password file. I am trying to consolidate user logons and thinking about letting LAN users to authenticate against Active Directory.Services…
Sergei
  • 1,226
  • 16
  • 25
7
votes
1 answer

802.1x computer authentication using hostname instead of cert

My configuration includes: Cisco ACS as RADIUS server, MS AD, MS PKI, Cisco 2960G switches. Workstations are 95% XP Pro SP3 fully patched, some 7 pro fully patched. Computer cert autoenrollment enabled and working. GPO for Resulting NIC settings…
Paul Ackerman
  • 2,729
  • 1
  • 16
  • 23
7
votes
3 answers

How to disabled password authentication for specific users in SSHD

I have read several posts regarding restricting ALL users to Key authentication ONLY, however I want to force only a single user (svn) onto Key auth only, the rest can be key or password. I read…
Nick
  • 183
  • 3
  • 11
7
votes
2 answers

IIS Basic Authorization ala .htaccess/.htpasswd in apache

How do I implement the protection of the pages (asp.net mvc app), so when I hit the home page or any other pages within the application I get a login dialog popup in the browser I'm looking for something similar to what Apache .htaccess and…
7
votes
2 answers

SQL Server: dbo vs db_owner role member?

I'm assinging user to a new database. What is the difference of user being a default dbo user compared to assinging login as a db_owner role member?
7
votes
5 answers

Two Factor Authentication on EC2

I need to host stuff for a financial institution on EC2. The bank wants complete Two Factor Authentication so Stuff like having SSH with a key with password. Something like SecureID or similar would be great. How can I effectively create two factor…
Stewart Robinson
  • 1,155
  • 4
  • 12
  • 24
7
votes
3 answers

IIS Digest repeatedly asking for authentication

I have a development copy of an ASP.NET intranet site checked out and running on my local machine. We're using digest authentication to allow users to log in using their active directory accounts. On my development copy only, Digest sometimes will…
David Budiac
  • 515
  • 1
  • 6
  • 11
7
votes
2 answers

Can I password protect a location (not directory) in apache using htaccess?

I have used code like this in apache configuration to protect locations with password AuthType Basic AuthName "Protected Area" AuthUserFile /home/user/public_html/.htpasswd Require valid-user is…
dimvic
  • 231
  • 2
  • 7
7
votes
3 answers

IIS asks for login/pass when accessed using hostname but not when 'localhost' is used. Why?

I have setup IIS on my xp machine and have setup a default homepage (that comes with the IIS installed). It is a help page I think. when I access the page with http://localhost it works fine (IE/Chrome or FF) but when I access it using…
sb.
  • 73
  • 1
  • 1
  • 4
7
votes
2 answers

A single AD user can't log into a single Mac bound to the domain (DirectoryServices error). How can I resolve this?

On our campus, we have about 60 Macs joined to our Active Directory domain. Most users have no problems logging into Macs, as long as their accounts are configured correctly. However, we have one particular user who is unable to log in to just some…
Ben Wyatt
  • 311
  • 1
  • 4
  • 11
6
votes
1 answer

How do I secure the access token, on Linux, to remote, automated secrets stores like Hashicorp Vault?

There seems to be a bit of a "chicken and egg" problem with the passwords to the password managers like Hashicorp Vault for Linux. While researching this for some Linux servers, someone clever asked, "If we're storing all of our secrets in a…
6
votes
1 answer

Secure Graphite installation

I think I misunderstand something here. I've installed Graphite with Docker (sitespeedio/graphite) and set a Basic Auth for the Web-Panel. I opened the Firwall for Port 2003 to get in datapoints from other servers and it worked fine. But there is no…
f00860
  • 1,203
  • 1
  • 9
  • 12
6
votes
4 answers

What is DNS TXT record "mailru-verification"?

Sometimes I see this mailru-verification DNS record. I've Googled - and Yandexed ;) - but I found nothing about it. I suspected that is a kind of russian SPF implementation... dig example.com TXT outputs ; <<>> DiG 9.9.5-3ubuntu0.8-Ubuntu <<>>…
nulll
  • 505
  • 1
  • 5
  • 9
6
votes
1 answer

NGINX does not prompt for client ssl certificate

On our setup we want to promt a user for a client ssl certificate. All certificates are issued by StartSSL. The problem is that even though ssl_verify_client on; is set 'on', the website / browser does not prompt for the certificate. How can I get…
Flatron
  • 318
  • 2
  • 5
  • 19
6
votes
3 answers

OpenSSH two factor authentication combined with Kerberos / public key

I'm trying to implement two-factor authentication for OpenSSH. The environment is Centos 7 (kernel: 3.10.0-229.1.2.el7.x86_64) with OpenSSH_6.6.1p1, OpenSSL 1.0.1e-fips 11 Feb 2013. We have Active Directory (LDAP) + Kerberos deployed. The…
dgyuri92
  • 71
  • 1
  • 4