Questions tagged [authentication]

A process of proving that an entity (commonly a user or organization) is who they claim to be, or who they were previously identified as being. Authentication does not guarantee that particular entity's identity absolutely, it just proves that they are the same agent that has previously successfully asserted their identity. There are three factors (types) of authentication, and a particular authentication process may combine two or more different factors.

Authentication is critical to systems security. It is the mechanism an authoritative system uses to validate a given entity's asserted identity (who they claim to be) is the same as that entity's stored credentials. Credentials must be previously stored for an entity either by the authoritative system, or by another trusted system, before authentication can occur.

Authentication is commonly used in real life in a number of different scenarios, for example a national border agent confirming a person's identity using a passport.

Authentication usually requires the entity being authenticated to produce one or more tokens. These tokens are then used, possibly alongside other properties or characteristics of the entity, to confirm their identity. An example of an authentication token is a password. These tokens can fall into three broad categories, or factors:

  • Something you know. This is the most commonly used authentication factor in electronic systems. It is most commonly implemented as a password or PIN (personal identification number). This is also the most commonly misused authentication factor. Many system require a secondary security question, such as your mother's maiden name, place you were born in or other such trivia. These all belong to this single factor, thus systems can as as many questions as they like and they are still single factor authentication; all the answers are something the entity would know.
  • Something you have. This is most commonly implemented as a formula number generator (like an RSA Key Fob) or a digital certificate (which can be stored on a smart card or less securely as a simple file on a computer). The Key Fobs, Smart Cards, and SSL Certificates are the most commonly used forms of this factor.
  • Something you are. This is commonly known as biometric security. Fingerprints and iris scans are the most common form when used with electronic access systems. Fingerprints and DNA are the most commonly used in law enforcement.

It should be noted that some security experts have reservations about the factor categories. Specifically all authentication factors are fed into the authentication mechanism as computerized information and are therefore subject to the same possible tampering or forgery as any other information. Digital Certificates for example are essentially passwords that are so long a normal person would never memorize it; it must be stored on a medium (thus termed "something you have"). Similarly anyone who has seen a spy movie has undoubtedly seen a fictional character copy a fingerprint or fake an iris scan. This is possible because the authentication mechanism is reliant on a digital reproduction of the physical item; a digital representation that can be duplicated.

There are many indirect authentication schemes as well. Kerberos is one of the most popular, you authenticate against a central store, which then gives you a token. The token can then be used to grant you access to other systems in lieu of the original authentication mechanism.

Authentication should not be confused with Authorization, which involves granting rights to a specific entity. Authorization schemes are commonly dependent on Authentication to ensure security, but are not the same.

See Wikipedia for more information about Authentication and Security.

2218 questions
5
votes
3 answers

Single sign on with Apache and LDAP

I have a server running two web applications: Gerrit and Mantis BT. Now, these applications connect to an LDAP server to authenticate users and it works fine. But the user has to authenticate for each application; I would like to allow the user to…
5
votes
3 answers

Check Primary Authentication Protocol for Active Directory (NTLM or Kerberos?)

How can I check, from a client machine (in Global Group)(also is local admin), whether the domain controller is authenticating my login request to the domain using NTLM or Kerberos? I know that Kerberos is enabled by default, but the domain Admin…
Andrew Watson
  • 53
  • 1
  • 1
  • 3
5
votes
1 answer

IIS 8.5 Windows Authentication failing for some users

I have an application that was installed requiring Windows Authentication under Windows 2012, IIS 8.5. When certain users use the application, they're receiving a 401 error after the challenge/response. Others can use the site without problems. …
5
votes
1 answer

Use more complex AND/OR structure with PAM

PAM allows to use sufficent and required for some logic, like auth sufficient pam_a.so auth required pam_b.so auth required pam_c.so which would mean "either a is true, or b must be true and then c must be true". Is it possible to do more complex…
allo
  • 1,620
  • 2
  • 22
  • 39
5
votes
2 answers

Using both basic and client-certificate authentication with GlassFish

I'm currently building a Java-servlet applcation (using Jersey on GlassFish to be specific). In some parts of the application I need to authenticate the user using basic authentication and in some other parts I need to use client certificates. Which…
Yrlec
5
votes
1 answer

My two-way trust with selective auth seems to behave opposite to a one-way trust

I'm not sure why I'm the only one running into this, I think it's a larger problem with Server 2012 and RDS protocols... With 2008 machines, you can use utilize a one way trust to authenticate across domains with the TSGateway service, but with…
5
votes
2 answers

SMB vs NFS authentication

Can anyone briefly describe me what is the biggest difference between SMB authentication and NFS v.3 authentication? I think that in SMB it is based on user's login and password whereas in NFS it is based on host authentication.
TheOpti
  • 163
  • 1
  • 1
  • 5
5
votes
1 answer

nginx: understanding the purpose of auth_http (IMAP proxy)

I would like to send IMAP client requests to an IMAP back-end via an nginx proxy. According to the the mail_auth_http module, a directive auth_http has to be used in order to authenticate the clients. But what exactly is the purpose of auth_http,…
watain
  • 151
  • 1
  • 3
  • 14
5
votes
2 answers

Overriding Parameters in Previously Declared Puppet Resource

I'm attempting to rebuild nwaller's sssd puppet module to be entirely LDAP based and to be a little cleaner. In it we have a resource defined for each authentication domain of the form define sssd::domain ( $domain = $name, $domain_description…
Scott Pack
  • 14,907
  • 10
  • 53
  • 83
5
votes
1 answer

Preventing a Domain Computer from Logging off Causes loss of Authentication

I have a set a domain computer to not require a password on wakeup. This is a strange situation I know but we want the user to never have to login to the computer unless he specifically logs out or restarts the computer. This itself works,…
Reafidy
  • 319
  • 1
  • 7
  • 18
5
votes
1 answer

ModSecurity on Apache (Debian Wheezy), Authentication logging

I am new to ModSecurity, it works great on the server, but I would like to control the way it logs things. For example as I am troubleshooting my website in order to whitelist or correct php coding problems so that I can have a clean…
durduvakis
  • 51
  • 5
5
votes
1 answer

User can't connect to samba share on windows (others can)

I have setup Samba in a Debian machine so that existing users in the linux server can connect to their homes and different shares using Windows. user1, user2 and user3 can connect without problems, but user4 can't access any of the shares. user4 can…
Lando
  • 595
  • 2
  • 5
  • 9
5
votes
1 answer

How to make exception in password locking via pam_tally2 for specific user?

I need to make an exception for a specific user, so that his failed logins are not counted by pam_tally2, and well, this is not a root account (I'd use magic_root then). Is it doable?
5
votes
3 answers

SQL Server - Connect as another domain user

We use Windows Authentication for connecting to our internal SQL Server instances (a mix of 2005 and 2008). When I open SQL Server Management Studio and connect to a server it obviously connected me using my current domain credentials. Is it…
Martin
  • 572
  • 4
  • 14
  • 26
5
votes
3 answers

Is there an easier way to add public-key authentication for new users?

I am in the arduous and painful process of setting up secure users on a new web LEMP server with Ubuntu 12.04. I was initially going to setup something like vsftpd or proftpd but many have suggested just to use SFTP directly so I will. Ultimately,…
JM4
  • 1,144
  • 3
  • 18
  • 29