Questions tagged [authentication]

A process of proving that an entity (commonly a user or organization) is who they claim to be, or who they were previously identified as being. Authentication does not guarantee that particular entity's identity absolutely, it just proves that they are the same agent that has previously successfully asserted their identity. There are three factors (types) of authentication, and a particular authentication process may combine two or more different factors.

Authentication is critical to systems security. It is the mechanism an authoritative system uses to validate a given entity's asserted identity (who they claim to be) is the same as that entity's stored credentials. Credentials must be previously stored for an entity either by the authoritative system, or by another trusted system, before authentication can occur.

Authentication is commonly used in real life in a number of different scenarios, for example a national border agent confirming a person's identity using a passport.

Authentication usually requires the entity being authenticated to produce one or more tokens. These tokens are then used, possibly alongside other properties or characteristics of the entity, to confirm their identity. An example of an authentication token is a password. These tokens can fall into three broad categories, or factors:

  • Something you know. This is the most commonly used authentication factor in electronic systems. It is most commonly implemented as a password or PIN (personal identification number). This is also the most commonly misused authentication factor. Many system require a secondary security question, such as your mother's maiden name, place you were born in or other such trivia. These all belong to this single factor, thus systems can as as many questions as they like and they are still single factor authentication; all the answers are something the entity would know.
  • Something you have. This is most commonly implemented as a formula number generator (like an RSA Key Fob) or a digital certificate (which can be stored on a smart card or less securely as a simple file on a computer). The Key Fobs, Smart Cards, and SSL Certificates are the most commonly used forms of this factor.
  • Something you are. This is commonly known as biometric security. Fingerprints and iris scans are the most common form when used with electronic access systems. Fingerprints and DNA are the most commonly used in law enforcement.

It should be noted that some security experts have reservations about the factor categories. Specifically all authentication factors are fed into the authentication mechanism as computerized information and are therefore subject to the same possible tampering or forgery as any other information. Digital Certificates for example are essentially passwords that are so long a normal person would never memorize it; it must be stored on a medium (thus termed "something you have"). Similarly anyone who has seen a spy movie has undoubtedly seen a fictional character copy a fingerprint or fake an iris scan. This is possible because the authentication mechanism is reliant on a digital reproduction of the physical item; a digital representation that can be duplicated.

There are many indirect authentication schemes as well. Kerberos is one of the most popular, you authenticate against a central store, which then gives you a token. The token can then be used to grant you access to other systems in lieu of the original authentication mechanism.

Authentication should not be confused with Authorization, which involves granting rights to a specific entity. Authorization schemes are commonly dependent on Authentication to ensure security, but are not the same.

See Wikipedia for more information about Authentication and Security.

2218 questions
6
votes
6 answers

Certificate Authentication

I am currently working on deploying a website for staff to use remotely and would like to make sure it is secure. I was thinking would it be possible to set up some kind of certificate authentication where I would generate a certificate and…
Steve McCall
  • 103
  • 2
  • 6
6
votes
1 answer

Centralize authentication and user's home folder

We have about 7 Linux servers and from time to time we setup a new one... For each new install we have to create the same users and ask them to change their default passwords to new ones ... Plus for us, we have to copy our user preferences and…
Kami
  • 1,424
  • 13
  • 25
5
votes
4 answers

ubuntu - how can I avoid typing a password on every admin action?

I just set-up ubuntu 9.10 on my computer, and I'm trying to figure out how to avoid typing a password on every action that requires sudo privileges. I just want to type a password once on login and have all rights throughout my session. Also, I'd…
sa125
  • 325
  • 1
  • 7
  • 14
5
votes
1 answer

apache2: Require valid-user for everything except "special_page"

With Apache2 how may I require a valid user for every page except these special pages which can be seen by anybody? Thanks in advance for your thoughts. Update in response to comments; here is a working apache2 config:
matt wilkie
  • 481
  • 4
  • 12
  • 28
5
votes
4 answers

Schedule a disk snapshot on GKE

I'd like to schedule this command line to run every 12h on Google Container Engine: gcloud compute --project "qvitoo-com" disks snapshot \ "SPECIFIC_INSTANCE_ID" --zone "europe-west1-c" --snapshot-names \ "DB-staging-$(date -u…
Henrik
  • 386
  • 2
  • 4
  • 13
5
votes
1 answer

MongoDB rs.initiate error: replSetInitiate quorum check failed because not all proposed set members responded affirmatively

I have to start my own replica set with internal authentication enabled using X.509 certificates, but I failed. Any advice is welcome. MongoDB 3.2 x64 on Debian 8.2 x64. It is a problem from the MongoDB University course "M310: MongoDB Security". A…
Evgeni Nabokov
  • 151
  • 1
  • 2
  • 7
5
votes
2 answers

Automate war deployment in VPC's private subnet on tomcat7

I have a VPC with public and private subnets. Public subnet contains my Nating and Bastion instances Private subnet contains my application servers (3 ec2 instances running tomcat7 with my project war file). These 3 instance are behined the…
5
votes
1 answer

/etc/tor/torsocks.conf not working

I try to activate username and password authentication for my tor installation using the fields SOCKS5Username and SOCKS5Password in the /etc/tor/torsocks.conf file. I have restarted the service after config change and checked if it really…
Til
  • 63
  • 1
  • 7
5
votes
2 answers

mysql authentification plugin is not loaded

Problem: I am encountering an login problem when setting up users in mysql. Old users can login as expected, for newly created users I cannot login and get an error message. Executed SQL: CREATE USER 'monty'@'%' IDENTIFIED BY 'some_pass'; GRANT ALL…
lwi
  • 161
  • 1
  • 1
  • 4
5
votes
0 answers

Why is it common in the startup world for ssh keys to be used for authetication instead of kerberos?

My first few jobs as a linux admin had be working under some very senior admins. In all of these cases kerberos was setup for users to request a security token and gain access to company servers for a set amount of time. Now as I have started…
5
votes
1 answer

Samba NT_STATUS_ACCESS_DENIED error on Ubuntu

I set up a Samba server on Ubuntu. Everything goes fine when I allow guest access, but when I try to setup a configuration for a specific user, I receive the error below: $ smbclient //x.x.x.x/john -U john Enter john's password: Domain=[MYDOMAIN]…
Razvan
  • 459
  • 2
  • 6
  • 15
5
votes
2 answers

Disable HTTP Authentication for OPTIONS requests in Tomcat

I have an API protected by HTTP Basic Authentication. When I want to make AJAX requests against the API, the browser send an OPTIONS request which doesn't carry the Authorization header so it gets rejected and thus my AJAX call is not allowed by the…
4e4c52
  • 173
  • 2
  • 6
5
votes
2 answers

Privileges when doing sudo to another domain user

Suppose I have a corporate domain mydomain using MS Active Directory. In the domain I have the users myuser and youruser. Now, on one specific Ubuntu machine mymachine, myuser has sudo rights, and does sudo su youruser (or sudo -u youruser sh).…
JHH
  • 183
  • 1
  • 6
5
votes
0 answers

Samba authentication and LDAP

I have an OpenLDAP server that I use for authentication and authorization for various services. All users are of object type inetOrgPerson and my groups are groupOfNames. Now I want to configure Samba to authenticate against LDAP as well (with group…
Chris
  • 193
  • 1
  • 6
5
votes
1 answer

Windows server 2012 R2 - delay before certificates start working

I have this weird unexplained delay before the certificates i put in my servers start actually working it goes something like this: I add the certificates snap-in to mmc to manage the computer account certificates I then add some certificates to the…
amit