Questions tagged [authentication]

A process of proving that an entity (commonly a user or organization) is who they claim to be, or who they were previously identified as being. Authentication does not guarantee that particular entity's identity absolutely, it just proves that they are the same agent that has previously successfully asserted their identity. There are three factors (types) of authentication, and a particular authentication process may combine two or more different factors.

Authentication is critical to systems security. It is the mechanism an authoritative system uses to validate a given entity's asserted identity (who they claim to be) is the same as that entity's stored credentials. Credentials must be previously stored for an entity either by the authoritative system, or by another trusted system, before authentication can occur.

Authentication is commonly used in real life in a number of different scenarios, for example a national border agent confirming a person's identity using a passport.

Authentication usually requires the entity being authenticated to produce one or more tokens. These tokens are then used, possibly alongside other properties or characteristics of the entity, to confirm their identity. An example of an authentication token is a password. These tokens can fall into three broad categories, or factors:

  • Something you know. This is the most commonly used authentication factor in electronic systems. It is most commonly implemented as a password or PIN (personal identification number). This is also the most commonly misused authentication factor. Many system require a secondary security question, such as your mother's maiden name, place you were born in or other such trivia. These all belong to this single factor, thus systems can as as many questions as they like and they are still single factor authentication; all the answers are something the entity would know.
  • Something you have. This is most commonly implemented as a formula number generator (like an RSA Key Fob) or a digital certificate (which can be stored on a smart card or less securely as a simple file on a computer). The Key Fobs, Smart Cards, and SSL Certificates are the most commonly used forms of this factor.
  • Something you are. This is commonly known as biometric security. Fingerprints and iris scans are the most common form when used with electronic access systems. Fingerprints and DNA are the most commonly used in law enforcement.

It should be noted that some security experts have reservations about the factor categories. Specifically all authentication factors are fed into the authentication mechanism as computerized information and are therefore subject to the same possible tampering or forgery as any other information. Digital Certificates for example are essentially passwords that are so long a normal person would never memorize it; it must be stored on a medium (thus termed "something you have"). Similarly anyone who has seen a spy movie has undoubtedly seen a fictional character copy a fingerprint or fake an iris scan. This is possible because the authentication mechanism is reliant on a digital reproduction of the physical item; a digital representation that can be duplicated.

There are many indirect authentication schemes as well. Kerberos is one of the most popular, you authenticate against a central store, which then gives you a token. The token can then be used to grant you access to other systems in lieu of the original authentication mechanism.

Authentication should not be confused with Authorization, which involves granting rights to a specific entity. Authorization schemes are commonly dependent on Authentication to ensure security, but are not the same.

See Wikipedia for more information about Authentication and Security.

2218 questions
6
votes
1 answer

Configure anonymous authentication to use app pool identity for a specific site

Instead of flipiping the switch in the GUI to tell IIS to use the Application Pool Identity for Anonymous authentication, I'd like to do this in a powershell script. Scott Forsyth posted a solution which changes the default for all sites. How can I…
marapet
  • 330
  • 2
  • 10
6
votes
2 answers

How to grant su access to wheel without asking for password on FreeBSD?

I would like to grant users of the wheel group (other sysadmins) su access without being asked for password. I know how to do it with pam in linux, but the question now is for FreeBSD. I am not familiar with the syntax for FreeBSD's PAM subsystem.…
cstamas
  • 6,707
  • 25
  • 42
6
votes
3 answers

What is Causing this IIS 7 Web Service Sporadic Connectivity Error?

On sporadic occasions we receive the following error when attempting to call an .asmx web service from a .Net client application: "The underlying connection was closed: A connection that was expected to be kept alive was closed by the server. …
user11764
6
votes
3 answers

Managing service passwords with Puppet

I'm setting up my Bacula configuration in Puppet. One thing I want to do is ensure that each password field is different. My current thought is to hash the hostname with a secret value that would ensure each file daemon has a unique password and…
Jeff Ferland
  • 20,547
  • 2
  • 62
  • 85
6
votes
3 answers

How can I password prompt certain IPs and allow all others free access using Apache?

SOLVED: The idea is that if the visitor comes from China they have to pass a basic authentication. If you have any other IP address you can visit the site without being hassled (including proxies) //1400 rules.... SetEnvIf Remote_Addr…
Moak
  • 734
  • 3
  • 10
  • 31
6
votes
5 answers

Hotmail Sender ID always fails with "temperror" regardless of SPF

When we send mail to Hotmail servers, they do not recognize our Sender ID. In the receiving mail source, it reads Authentication-Results: hotmail.com; sender-id=temperror ... when it should say pass as with every other one. Therefore our legitimate…
Tom
  • 61
  • 1
  • 2
6
votes
2 answers

How To Organize and Use Multiple RSA Keys On Local Machine?

I have Server_A, Server_B, and Server_C. I want to generate unique authentication keys for each, and organize them on my local machine running Lion like so: Put server_A keys in Users/username/.ssh/server_A Put server_B keys in…
bottles
  • 389
  • 1
  • 2
  • 11
6
votes
1 answer

Time taken for authentication to work again after changing system time

One of our domain controllers clock drifted way out of sync with the rest of the network (thanks to me forgetting to turn off VMWare's time synchronisation), which caused a whole bunch of servers to lose their ability to authenticate, given that…
Mark Henderson
  • 68,823
  • 31
  • 180
  • 259
6
votes
2 answers

What are the steps that occur during a ssh connection establishment on a machine that does use password based authentication?

I want to know what happens behind the scenes in establishing a ssh connection, i mean till we land on the shell in a Linux from a Linux machine. I know that password is not sent in plain text in a ssh connection. So what do they do to encrypt the…
bagavadhar
  • 538
  • 4
  • 14
6
votes
2 answers

How to set up SSH passwordless key authentication for remote access only, allowing local users to use passwords

I am trying to get an SSH server running Ubuntu 10.04 to allow password logons only when coming from the local network. For all other users, especially those logging in from the internet via the firewall, I want to force Key based authentication. …
senorsmile
  • 713
  • 8
  • 20
6
votes
5 answers

Cannot connect to a VPN server - authentication failed with error code 691

When trying to connect to a VPN server, I get the 691 error code on the client, which say: Error Description: 691: The remote connection was denied because the user name and password combination you provided is not recognized, or the …
stacker
  • 841
  • 3
  • 10
  • 15
6
votes
5 answers

Linux authentication via ADS -- allowing only specific groups in PAM

I'm taking the samba / winbind / PAM route to authenticate users on our linux servers from our Active Directory domain. Everything works, but I want to limit what AD groups are allowed to authenticate. Winbind / PAM currently allows any enabled…
Kenaniah
  • 213
  • 1
  • 3
  • 8
6
votes
2 answers

Pass username from apache Basic Authentication to cherrypy

I need to use apache basic authentication for part of my application. I would like to get the authenticated username from apache, but I cannot seem to find where to access it. I can see the username in the apache log, so I know it's there somewhere.…
adam
  • 163
  • 1
  • 1
  • 7
6
votes
5 answers

How to Login to Windows XP/7 Using a USB stick for authentication

Is there a way to log into Windows using a USB stick? (on Windows XP/7) I have student workers whom I would like to give admin rights for maintenance, but I would like to refrain from giving out a password for various reasons (students joining and…
Force Flow
  • 1,165
  • 5
  • 23
  • 45
6
votes
4 answers

How can I prevent Apache from exposing a user's password?

When using basic authentication (specifically via LDAP, but htpasswd also) with Apache, it makes the REMOTE_USER variable available to the PHP / Ruby / Python code underneath -- this is very useful for offloading authentication to the webserver. In…
Marius Marais
  • 183
  • 1
  • 5