Questions tagged [authentication]

A process of proving that an entity (commonly a user or organization) is who they claim to be, or who they were previously identified as being. Authentication does not guarantee that particular entity's identity absolutely, it just proves that they are the same agent that has previously successfully asserted their identity. There are three factors (types) of authentication, and a particular authentication process may combine two or more different factors.

Authentication is critical to systems security. It is the mechanism an authoritative system uses to validate a given entity's asserted identity (who they claim to be) is the same as that entity's stored credentials. Credentials must be previously stored for an entity either by the authoritative system, or by another trusted system, before authentication can occur.

Authentication is commonly used in real life in a number of different scenarios, for example a national border agent confirming a person's identity using a passport.

Authentication usually requires the entity being authenticated to produce one or more tokens. These tokens are then used, possibly alongside other properties or characteristics of the entity, to confirm their identity. An example of an authentication token is a password. These tokens can fall into three broad categories, or factors:

  • Something you know. This is the most commonly used authentication factor in electronic systems. It is most commonly implemented as a password or PIN (personal identification number). This is also the most commonly misused authentication factor. Many system require a secondary security question, such as your mother's maiden name, place you were born in or other such trivia. These all belong to this single factor, thus systems can as as many questions as they like and they are still single factor authentication; all the answers are something the entity would know.
  • Something you have. This is most commonly implemented as a formula number generator (like an RSA Key Fob) or a digital certificate (which can be stored on a smart card or less securely as a simple file on a computer). The Key Fobs, Smart Cards, and SSL Certificates are the most commonly used forms of this factor.
  • Something you are. This is commonly known as biometric security. Fingerprints and iris scans are the most common form when used with electronic access systems. Fingerprints and DNA are the most commonly used in law enforcement.

It should be noted that some security experts have reservations about the factor categories. Specifically all authentication factors are fed into the authentication mechanism as computerized information and are therefore subject to the same possible tampering or forgery as any other information. Digital Certificates for example are essentially passwords that are so long a normal person would never memorize it; it must be stored on a medium (thus termed "something you have"). Similarly anyone who has seen a spy movie has undoubtedly seen a fictional character copy a fingerprint or fake an iris scan. This is possible because the authentication mechanism is reliant on a digital reproduction of the physical item; a digital representation that can be duplicated.

There are many indirect authentication schemes as well. Kerberos is one of the most popular, you authenticate against a central store, which then gives you a token. The token can then be used to grant you access to other systems in lieu of the original authentication mechanism.

Authentication should not be confused with Authorization, which involves granting rights to a specific entity. Authorization schemes are commonly dependent on Authentication to ensure security, but are not the same.

See Wikipedia for more information about Authentication and Security.

2218 questions
5
votes
3 answers

Active Directory authentication rejected and the bad password count does not increment or reset

There is a strange and confusing (to me and to users) issue plaguing authentication. I do not know how long it has been occurring, but I believe it to be quite a while. Only recently, with the use of the Account Lockout tool have I realized that…
Myrddin Emrys
  • 636
  • 2
  • 10
  • 24
5
votes
2 answers

service static files under nginx & HTTP-Authentication

I have an app deployed in testing mode on a server. Access to it has been restricted to a select group of users via HTTP-Authentication. That works fine. The problem is that if I serve static files via different 'location' directive, nginx gives me…
5
votes
1 answer

How exactly does "silent" authentication using matching local accounts on a Windows network work?

Imagine a Windows workgroup network where two computers each have a local account with the same username/password combination. If I log on to one computer, and try to connect to a non-public shared resource on the other, I'm not prompted for…
Martin
  • 65
  • 1
  • 4
5
votes
3 answers

Meraki wireless access point disconnects clients

We have a Meraki MR16 Cloud Managed AP and it disconnects certain clients. The clients with Intel wireless cards work without any disconnects. The Meraki reports the follow in its event log: Sep 4 09:55:47 WPA authentication Sep 4…
resolver101
  • 301
  • 3
  • 7
  • 17
5
votes
2 answers

Nginx with PAM authentication through pam_script

Have anyone set up such a configuration? It's not working for me. I've installed nginx-extras on Ubuntu 12.04 (it's built with PAM module), and added to site config: location ^~ /restricted_place/ { auth_pam "Please specify login…
Envek
  • 223
  • 3
  • 7
5
votes
4 answers

MOSS 2007 cannot configure Forms Authentication using ActiveDirectoryMembershipProvider

I'm having a really difficult time trying to get my Sharepoint site to use Forms Authentication. I've tried using an ActiveDirectoryMembershipProvder and the LDAP equivalent but both of them seem absolutely unable to find any users from…
glenatron
  • 235
  • 2
  • 4
  • 10
5
votes
2 answers

IIS Identities: Application Pool vs Connect As in Basic Settings

In the Basic Settings section of a website in IIS 7.5, there is an option to specify a user account via Connect As.... If this is kept off, pass through authentication is used. I assumed that would use the identity of the Application Pool however…
Marcus
  • 400
  • 2
  • 5
  • 16
5
votes
2 answers

Basic HTTP Authentication in IIS

Forgive my lack of IIS experience, but I have a user on a hosted server running IIS with Plesk. He uses protected folders, and I'm looking for a way to: Allow him to protect folders using a simple username/password combo Whitelist a static IP so…
Aksival
  • 161
  • 4
5
votes
2 answers

Setting REMOTE_USER for Trac in Gunicorn behind Nginx

I want to run Trac in Gunicorn, behind Nginx. Nginx handles user authentication via LDAP (which works), but I can't get the REMOTE_USER passed to Trac. For uWSGI I would configure Nginx like this (tested and it works): uwsgi_param REMOTE_USER…
Jan Fabry
  • 926
  • 1
  • 11
  • 18
5
votes
1 answer

How can I protect a Tomcat webapp that's reverse proxied in an Apache2 virtual host using basic authentication?

I'm having trouble figuring out how to adding basic HTTP authentication to password-protect a development testing environment running on a production web server. Both the main site and the testing environment are virtual hosts that use AJP proxying…
5
votes
3 answers

Sync user accounts over multiple linux servers

What is the best way to sync multiple user accounts and home directories over multiple servers, they will all be the same OS. The servers are in different locations around the world, so if one goes down the others are still available. at the moment…
Elgoog
  • 215
  • 3
  • 6
5
votes
1 answer

Google Chrome and kerberos authentication against Apache

I've managed to get kerberos authentication to work now with Apache and Likewise Open but so far, Google Chrome doesn't seem to play fair. Unless I start it with chrome.exe --auth-server-whitelist="*company.com" it does only pop-up a login window…
Lars
  • 578
  • 2
  • 8
  • 18
5
votes
5 answers

Postfix rejecting mail from authenticated clients

I am trying to configure Postfix so that it would accept mail from authenticated clients outside $mynetworks. When I try to send a test email from my iPhone, which is configured to use port 25, SSL and password authentication, the mail gets rejected…
NPE
  • 679
  • 3
  • 10
  • 20
5
votes
2 answers

Logging authentication failure on OpenLDAP

I need to log authentication failure on OpenLDAP. What is the proper log level bit for that? Or is there another configuration for such a thing?
Daniel C. Sobral
  • 5,713
  • 6
  • 34
  • 48
5
votes
6 answers

How to customize telnet login prompt on linux

When I run login command on debian, I get: hostname login: _ on RHEL5, Solaris or HP-UX I get: login: _ I need to be able to customize login: and password: prompts it on a Linux box. I can recompile the package, but is there a better (easier) way…
Michał Šrajer
  • 856
  • 5
  • 11