Questions tagged [authentication]

A process of proving that an entity (commonly a user or organization) is who they claim to be, or who they were previously identified as being. Authentication does not guarantee that particular entity's identity absolutely, it just proves that they are the same agent that has previously successfully asserted their identity. There are three factors (types) of authentication, and a particular authentication process may combine two or more different factors.

Authentication is critical to systems security. It is the mechanism an authoritative system uses to validate a given entity's asserted identity (who they claim to be) is the same as that entity's stored credentials. Credentials must be previously stored for an entity either by the authoritative system, or by another trusted system, before authentication can occur.

Authentication is commonly used in real life in a number of different scenarios, for example a national border agent confirming a person's identity using a passport.

Authentication usually requires the entity being authenticated to produce one or more tokens. These tokens are then used, possibly alongside other properties or characteristics of the entity, to confirm their identity. An example of an authentication token is a password. These tokens can fall into three broad categories, or factors:

  • Something you know. This is the most commonly used authentication factor in electronic systems. It is most commonly implemented as a password or PIN (personal identification number). This is also the most commonly misused authentication factor. Many system require a secondary security question, such as your mother's maiden name, place you were born in or other such trivia. These all belong to this single factor, thus systems can as as many questions as they like and they are still single factor authentication; all the answers are something the entity would know.
  • Something you have. This is most commonly implemented as a formula number generator (like an RSA Key Fob) or a digital certificate (which can be stored on a smart card or less securely as a simple file on a computer). The Key Fobs, Smart Cards, and SSL Certificates are the most commonly used forms of this factor.
  • Something you are. This is commonly known as biometric security. Fingerprints and iris scans are the most common form when used with electronic access systems. Fingerprints and DNA are the most commonly used in law enforcement.

It should be noted that some security experts have reservations about the factor categories. Specifically all authentication factors are fed into the authentication mechanism as computerized information and are therefore subject to the same possible tampering or forgery as any other information. Digital Certificates for example are essentially passwords that are so long a normal person would never memorize it; it must be stored on a medium (thus termed "something you have"). Similarly anyone who has seen a spy movie has undoubtedly seen a fictional character copy a fingerprint or fake an iris scan. This is possible because the authentication mechanism is reliant on a digital reproduction of the physical item; a digital representation that can be duplicated.

There are many indirect authentication schemes as well. Kerberos is one of the most popular, you authenticate against a central store, which then gives you a token. The token can then be used to grant you access to other systems in lieu of the original authentication mechanism.

Authentication should not be confused with Authorization, which involves granting rights to a specific entity. Authorization schemes are commonly dependent on Authentication to ensure security, but are not the same.

See Wikipedia for more information about Authentication and Security.

2218 questions
5
votes
1 answer

Apache mod_auth_kerb asking 2 authentication

I've configured Apache to use mod_auth_kerberos. So far everything is working nicely for client thats connected to Active Directory and have their browser to NTLM enabled. When clients are not in the domain or the browser configured not to…
Rianto Wahyudi
  • 493
  • 3
  • 11
5
votes
0 answers

Nginx: Rate limit failed basic auth attempts

Given a simple HTTP Basic Auth setup in Nginx (1.14.1 at time of writing) like this: server { ... location / { auth basic "HTTP Auth Required"; auth basic user file "/path/to/htpasswd"; } } ... how would one apply rate limiting to…
JinnKo
  • 421
  • 3
  • 7
4
votes
1 answer

LDAP authentication ... Log in fail on the LDAP client

I can get the password and group from the LDAP client getent passwd getent group work sucessfully But when I try 'su USERNAME' the name from the LDAP server or 'ssh USERNAME@localhost' it prompt me a user password, I typed exactly the USERNAME…
billyduc
  • 1,617
  • 8
  • 24
  • 26
4
votes
1 answer

Windows 7 joining OS X Server domain

We're having trouble getting a new Windows 7 Ultimate machine joined to an OS X domain. I found this Apple KB article discussing the very same issue we're having. Basically, when entering all the information to join the domain (which all works fine…
colemanm
  • 659
  • 5
  • 10
  • 25
4
votes
1 answer

sshd_config AllowUsers and IPv6

Have two servers communicating via ssh and crontab, a "master" and a "slave". Only the master can connect (execute command) on the slave. Authentication was done automatically (IPv4) thanks to master's ~/.ssh/id_rsa.pub added to slave's…
Déjà vu
  • 5,546
  • 9
  • 36
  • 55
4
votes
1 answer

Kerberos MaxTokenSize

I had a user who has about 900 groups (some of them were nested so I suspect there was about 1000 groups) and he couldn't log in returning error stating that there are too much IDs. I have run a script to count his token size and it turned out to be…
4
votes
2 answers

Allow both domain users *and* local users to Centos 7 server

I need to allow domain users (userid and password) access to a Centos 7 server, as well as local users (SSH key/passwordless). I have configured sshd_config with both AllowUsers and AllowGroups and assumed that if I added the local user to those it…
machinist
  • 71
  • 1
  • 1
  • 6
4
votes
0 answers

Authentication issues when clients access domain-joined server from non Samba4 subdomain DNS name

We have an issue we’ve been struggling with for quite some time since we rolled out 10 Samba4 domain controllers at our main office and all remote sites about 3 years ago. Simplified Current Configuration: 2 DCs at main site with internal DNS using…
4
votes
1 answer

How well does haproxy scale for handling client certificate authentication?

My IoT company would like to use client certificate authentication to secure communications between each "thing" and a central server. We deploy about 30K things per year, and they have about a 5-year lifetime, so our server-side solution needs to…
4
votes
0 answers

Apache 2.4 Redundant LDAP Authentication

I'm trying to provide a redundant LDAP authentication to my webserver. ScriptAlias /nagios/cgi-bin "/usr/local/nagios/sbin" AuthLDAPBindDN "search@domain" AuthLDAPBindPassword "pass" AuthLDAPURL…
4
votes
1 answer

PowerBroker Open group listings and enumeration

I have several linux machines that use PowerBroker Open to authenticate users against AD. I've noticed that for some users it works just fine (authentication and all), but for others it does not (authentication obviously not due to the required…
Sirex
  • 5,499
  • 2
  • 33
  • 54
4
votes
4 answers

OS-agnostic way to set permissions and encrypt files

A friend of mine is physician and shares his office with other physicians (they're all psychiatrists). They're looking for a not to pricey and secure way to share and store files (basically text-only notes and reports) on a server (preferentially…
Javier
  • 163
  • 1
  • 6
4
votes
1 answer

How to work around a "logon workstations" restriction to the Domain Controller stopping authentication via LDAP

I am trying to allow users of an external linux based application server to authenticate with the service using their Active Directory credentials via LDAPS. It works well for admin accounts but fails for normal user accounts. The issue is that…
Sean Cull
  • 143
  • 1
  • 6
4
votes
1 answer

LDAP authentication fails

I try to set up an LDAP directory that will allow me to authenticate Debian users. Once the configuration of the LDAP server and PAM files is done, the authentication fails. I think the client doesn't find the ldap user into the directory. When I…
EAI
  • 43
  • 1
  • 1
  • 5
4
votes
1 answer

SSH authentication based on existing OpenVPN tunnel

I have a single CentOS server, and several Windows clients that should connect to it, from remote. I've successfully setup OpenVPN (with Public Keys), with which the clients connect to the server; and then they use SSH to do the actual work.…
Zvika
  • 233
  • 5
  • 10