Questions tagged [authentication]

A process of proving that an entity (commonly a user or organization) is who they claim to be, or who they were previously identified as being. Authentication does not guarantee that particular entity's identity absolutely, it just proves that they are the same agent that has previously successfully asserted their identity. There are three factors (types) of authentication, and a particular authentication process may combine two or more different factors.

Authentication is critical to systems security. It is the mechanism an authoritative system uses to validate a given entity's asserted identity (who they claim to be) is the same as that entity's stored credentials. Credentials must be previously stored for an entity either by the authoritative system, or by another trusted system, before authentication can occur.

Authentication is commonly used in real life in a number of different scenarios, for example a national border agent confirming a person's identity using a passport.

Authentication usually requires the entity being authenticated to produce one or more tokens. These tokens are then used, possibly alongside other properties or characteristics of the entity, to confirm their identity. An example of an authentication token is a password. These tokens can fall into three broad categories, or factors:

  • Something you know. This is the most commonly used authentication factor in electronic systems. It is most commonly implemented as a password or PIN (personal identification number). This is also the most commonly misused authentication factor. Many system require a secondary security question, such as your mother's maiden name, place you were born in or other such trivia. These all belong to this single factor, thus systems can as as many questions as they like and they are still single factor authentication; all the answers are something the entity would know.
  • Something you have. This is most commonly implemented as a formula number generator (like an RSA Key Fob) or a digital certificate (which can be stored on a smart card or less securely as a simple file on a computer). The Key Fobs, Smart Cards, and SSL Certificates are the most commonly used forms of this factor.
  • Something you are. This is commonly known as biometric security. Fingerprints and iris scans are the most common form when used with electronic access systems. Fingerprints and DNA are the most commonly used in law enforcement.

It should be noted that some security experts have reservations about the factor categories. Specifically all authentication factors are fed into the authentication mechanism as computerized information and are therefore subject to the same possible tampering or forgery as any other information. Digital Certificates for example are essentially passwords that are so long a normal person would never memorize it; it must be stored on a medium (thus termed "something you have"). Similarly anyone who has seen a spy movie has undoubtedly seen a fictional character copy a fingerprint or fake an iris scan. This is possible because the authentication mechanism is reliant on a digital reproduction of the physical item; a digital representation that can be duplicated.

There are many indirect authentication schemes as well. Kerberos is one of the most popular, you authenticate against a central store, which then gives you a token. The token can then be used to grant you access to other systems in lieu of the original authentication mechanism.

Authentication should not be confused with Authorization, which involves granting rights to a specific entity. Authorization schemes are commonly dependent on Authentication to ensure security, but are not the same.

See Wikipedia for more information about Authentication and Security.

2218 questions
6
votes
1 answer

Setting header based on client certificate

I have Apache running as a reverse proxy for an internal server. Users hitting the proxy are required to use client certificates. On the internal server, there is a web application that can use an HTTP header for authenticating users. I would…
6
votes
1 answer

CentOS requires entering password twice for sudo, login

At every login or sudo prompt, the server always rejects the password when it is first supplied, but accepts it the second time. I found this thread which describes what seems to be the same problem, but playing around with my…
Matt Phillips
  • 183
  • 1
  • 8
6
votes
2 answers

Easy multi-level authentication for sudo

I have a FreeBSD server with password-based SSH enabled. I would like to enable sudo, but I do not want a potential attacker to be one password away from root access. My current solution is logging in as root using a public key (remote password…
6
votes
2 answers

How can I configure my postfix server so reject_sender_login_mismatch doesn't block aliases of the main account?

I've recently setup postfix, dovecot, amavis and a suite of other tools using iRedMail, and I'm having difficultly authenticating to my outgoing mail server. The issue is this: xyz@mydomain.com is an alias to abc@mydomain.com. I authenticate using…
FilmJ
  • 766
  • 2
  • 9
  • 16
6
votes
1 answer

Understanding PAM authentication procedure on FreeBSD with security/sssd

I'm trying to understand what's behaving errantly on my PAM configuration on FreeBSD 10.0 The machine is configured with two different authentication realms, one is the default Unix authentication and the other one is using the System Security…
Vinícius Ferrão
  • 5,520
  • 11
  • 55
  • 95
6
votes
3 answers

How to start Mongo daemon with auth support

I want to start the MongoDB daemon with auth support using the Mongo init script: sudo /etc/init.d/mongod start I have also added db users to the database to authenticate. I'm working with two files: /etc/init.d/mongod (for init) and…
Scott
  • 163
  • 1
  • 1
  • 4
6
votes
2 answers

OpenSSH and PAM authentication using a public key

I'm looking for a way to authenticate users using a public key which is stored in a db (MongoDB). Similar questions usually resulted with a suggestion to installed a patched version of OpenSSH (https://github.com/wuputahllc/openssh-for-git) which…
Gilad Novik
  • 307
  • 2
  • 3
  • 10
6
votes
4 answers

sshd logging attempts to login without a private key

On my VPS, running Debian 7, I have ssh enabled on the default port 22 with only private key authentication enabled, all other ports are filtered with iptables. I am frequently getting login attempts from china under bogus usernames, such as "plesk"…
KaelanDuck
  • 61
  • 3
6
votes
2 answers

Mongo Sharding - Config Server and Mongo Authentication

I am needing to shard a database fairly soon, and am unclear on what the best practice is for enabling authentication on the mongos and config servers. I would like to have everything be secured with passwords. Should each config server have auth…
nakkor
  • 163
  • 1
  • 4
6
votes
2 answers

Redirect user on SSL authentication failure

I configured a VirtualHost with SSL enabled and SSL client authentication, all of that on apache2 2.2.8 (ubuntu server 8.04). All SSL certificates (CA, Server certificate, Client certificate, CRL) were generated with openssl command line. I want to…
linkdd
  • 183
  • 2
  • 5
6
votes
3 answers

backup and restoration of a freeipa infrastructure

I'm finding the documentation on ipa server backup and restoration sadly lacking, and being so centrally critical it's not something i'm really happy about shooting in the dark with - could some kind soul more knowledable in the matter please…
Sirex
  • 5,499
  • 2
  • 33
  • 54
6
votes
3 answers

Cisco Dot1x Port Authentication - VLAN selected based on what domain the user logs on to on computer?

Currently my company has been bought out by another. Due to this, another two companies users will be migrating into our office. It would be super handy if we could have the vlan chosen for the user based on what domain they try to login to using…
Lance
  • 281
  • 10
  • 20
6
votes
1 answer

Linux Client Active Directory Authentication stops working when failover

I have an issue with Linux clients trying to AD authentication by targeting a DNS name (corp.example.com). I have 2 Domain Controller servers DC1(10.0.0.3/24), DC2(10.1.0.3/24) both domain controllers for corp.example.com. Before starting this each…
Jim
  • 988
  • 7
  • 20
  • 33
6
votes
4 answers

OpenSSH server Authentication refused

I am running a Linux version 2.6.27-vpac2 on a PXA270 platform (armv5tel) I have a version of OpenSSH 3.8.1 p1 (Debian-8.sarge.4) trying to get to run on it. I have run the sshd in -ddd format to debug and below is the result when I try to connect: …
Marjon
  • 71
  • 1
  • 1
  • 3
6
votes
3 answers

LDAP and pam without binddn and anonymous access

I am working in a large company and can use its central read-only LDAP server remotely. The LDAP server does not allow anonymous binding. In order to use this server for authentication of the users on my small server with a pam module I need an…
Roman Byshko
  • 254
  • 2
  • 13