Questions tagged [authentication]

A process of proving that an entity (commonly a user or organization) is who they claim to be, or who they were previously identified as being. Authentication does not guarantee that particular entity's identity absolutely, it just proves that they are the same agent that has previously successfully asserted their identity. There are three factors (types) of authentication, and a particular authentication process may combine two or more different factors.

Authentication is critical to systems security. It is the mechanism an authoritative system uses to validate a given entity's asserted identity (who they claim to be) is the same as that entity's stored credentials. Credentials must be previously stored for an entity either by the authoritative system, or by another trusted system, before authentication can occur.

Authentication is commonly used in real life in a number of different scenarios, for example a national border agent confirming a person's identity using a passport.

Authentication usually requires the entity being authenticated to produce one or more tokens. These tokens are then used, possibly alongside other properties or characteristics of the entity, to confirm their identity. An example of an authentication token is a password. These tokens can fall into three broad categories, or factors:

  • Something you know. This is the most commonly used authentication factor in electronic systems. It is most commonly implemented as a password or PIN (personal identification number). This is also the most commonly misused authentication factor. Many system require a secondary security question, such as your mother's maiden name, place you were born in or other such trivia. These all belong to this single factor, thus systems can as as many questions as they like and they are still single factor authentication; all the answers are something the entity would know.
  • Something you have. This is most commonly implemented as a formula number generator (like an RSA Key Fob) or a digital certificate (which can be stored on a smart card or less securely as a simple file on a computer). The Key Fobs, Smart Cards, and SSL Certificates are the most commonly used forms of this factor.
  • Something you are. This is commonly known as biometric security. Fingerprints and iris scans are the most common form when used with electronic access systems. Fingerprints and DNA are the most commonly used in law enforcement.

It should be noted that some security experts have reservations about the factor categories. Specifically all authentication factors are fed into the authentication mechanism as computerized information and are therefore subject to the same possible tampering or forgery as any other information. Digital Certificates for example are essentially passwords that are so long a normal person would never memorize it; it must be stored on a medium (thus termed "something you have"). Similarly anyone who has seen a spy movie has undoubtedly seen a fictional character copy a fingerprint or fake an iris scan. This is possible because the authentication mechanism is reliant on a digital reproduction of the physical item; a digital representation that can be duplicated.

There are many indirect authentication schemes as well. Kerberos is one of the most popular, you authenticate against a central store, which then gives you a token. The token can then be used to grant you access to other systems in lieu of the original authentication mechanism.

Authentication should not be confused with Authorization, which involves granting rights to a specific entity. Authorization schemes are commonly dependent on Authentication to ensure security, but are not the same.

See Wikipedia for more information about Authentication and Security.

2218 questions
4
votes
2 answers

IIS: logging client certificate's thumbprint

On IIS 7.5, with client authentication by certificate, how to enable logging of client certificate's thumbprint (or serial, or subject dn) to IIS log?
4
votes
3 answers

Multiple Domain realmd/sssd Configuration on RHEL7?

I've configured our RHEL7 instance to support Active Directory login integration by using the documentation HERE. This describes using the "realm" command to configure the "sssd" service allowing for AD Integration. I've used the following commands…
Caesar Kabalan
  • 348
  • 1
  • 4
  • 12
4
votes
2 answers

ADFS - Combining Claims from Provider Trusts and AD

As part of implementing a SharePoint 2013 installation, I have configured SSO with ADFS on Windows Server 2012R2. There are two separate AD forests, one as part of the Hosted SharePoint/ADFS and one onsite corporate forest. Currently, I have the…
Antix
  • 383
  • 1
  • 6
  • 19
4
votes
1 answer

Postfix SMTP authenticated can send as anyone

The server correctly accepts/rejects the logins though dovecot's authentication mechanism, but after that I can pretend to be anyone when sending emails. smtpd_sender_login_maps =…
coladict
  • 219
  • 1
  • 7
4
votes
2 answers

How do PAM advanced options work, exactly?

I've been reading everything I can find on PAM (e.g. http://wpollock.com/AUnix2/PAM-Help.htm), however I'm still confused about how precisely the advanced options are supposed to work. For example, every reference says this: Each of the four…
pgoetz
  • 465
  • 1
  • 8
  • 16
4
votes
4 answers

LDAP over SSL/TLS working for everything but login on Ubuntu

I have gotten OpenLDAP with SSL working on a test box with a signed certificate. I can use an LDAP tool on a Windows box to view the LDAP over SSL (port 636). But when I run dpkg-reconfigure ldap-auth-config to setup my local login to use ldaps,…
Oliver Nelson
  • 239
  • 3
  • 9
4
votes
1 answer

Cookie Authentication in Apache

I'm trying to set up a reverse proxy in Apache. The user will be required to log in, and will then be sent a cookie. I want Apache to check the cookie. Is there a way to do this? EG, right now my config looks like this: #…
4
votes
1 answer

Exim4 require TLS for all hosts but localhost

As my webmailer does not support STARTTLS and I want to enable relaying for everyone at localhost, I would like to have Exim advertise AUTH PLAIN and LOGIN only without TLS if the connection was established from localhost. So in other words, I would…
Hurzelchen
  • 140
  • 1
  • 7
4
votes
3 answers

If I join esxi to an Active Directory domain, how does it choose which DC to authenticate to?

I'm familiar to vSphere and large installations, and not at all familiar with the free products. Topology & configuration We have some branch offices that use ESXi and have a DC resident on them, as a virtualized host. This is the only local DC…
4
votes
1 answer

SSH authentication mode selection

I am trying to figure out the SSH mechanism used while I try to ssh onto a production host. I see that the SSH client can choose among the available modes. But I'm not sure which mode is chosen and how. The SSHServer side sshd_config is configured…
broun
  • 187
  • 2
  • 2
  • 8
4
votes
2 answers

SSH authentication between my VPS and Bitbucket fail

I'm trying to setup SSH authentication between my VPS and Bitbucket for configure later automatic deployment via Capistrano (for web projects) and Capifony (for Symfony2 projects) so I follow this steps: Login in my VPS as root and execude the…
ReynierPM
  • 710
  • 5
  • 14
  • 30
4
votes
1 answer

Disable LDAP authentication on Ubuntu

I have an Ubuntu server that is able to authenticate users against our Domain. I can not contact the person who set this up, but I do find these packages installed: libaprtil1-ldap libldap-2.4-2 samba Our server is taking a good minute or so to…
wdhilliard
  • 43
  • 1
  • 3
4
votes
2 answers

Web app running as NETWORK SERVICE can connect to SQL Server but windows service running as LOCAL SYSTEM cannot

I have installed a .net web application on a Windows Server 2003 IIS server, running in an Application Pool as NETWORK SERVICE and connecting to SQL Server on a different machine using Integrated Security. The SQL Server machine is also running…
Rory
  • 482
  • 5
  • 12
  • 22
4
votes
0 answers

NIS client doesn't see group names

I have added a user to libvirt (id = 504) group on NIS server. On the client when I do group , I get groups: cannot find name for group ID 504 What should I do to get my clients to display group names correctly ? There are no id…
user186719
  • 41
  • 1
4
votes
1 answer

CRM 2011 - outlook connector always asking for authentication

In my organization everyone uses the Outlook 2010 connector to access the CRM. After the UR13 update, but not right away, some clients began experiencing a situation where the Outlook connector asks for login every time they double-click an entity…