Questions tagged [authentication]

A process of proving that an entity (commonly a user or organization) is who they claim to be, or who they were previously identified as being. Authentication does not guarantee that particular entity's identity absolutely, it just proves that they are the same agent that has previously successfully asserted their identity. There are three factors (types) of authentication, and a particular authentication process may combine two or more different factors.

Authentication is critical to systems security. It is the mechanism an authoritative system uses to validate a given entity's asserted identity (who they claim to be) is the same as that entity's stored credentials. Credentials must be previously stored for an entity either by the authoritative system, or by another trusted system, before authentication can occur.

Authentication is commonly used in real life in a number of different scenarios, for example a national border agent confirming a person's identity using a passport.

Authentication usually requires the entity being authenticated to produce one or more tokens. These tokens are then used, possibly alongside other properties or characteristics of the entity, to confirm their identity. An example of an authentication token is a password. These tokens can fall into three broad categories, or factors:

  • Something you know. This is the most commonly used authentication factor in electronic systems. It is most commonly implemented as a password or PIN (personal identification number). This is also the most commonly misused authentication factor. Many system require a secondary security question, such as your mother's maiden name, place you were born in or other such trivia. These all belong to this single factor, thus systems can as as many questions as they like and they are still single factor authentication; all the answers are something the entity would know.
  • Something you have. This is most commonly implemented as a formula number generator (like an RSA Key Fob) or a digital certificate (which can be stored on a smart card or less securely as a simple file on a computer). The Key Fobs, Smart Cards, and SSL Certificates are the most commonly used forms of this factor.
  • Something you are. This is commonly known as biometric security. Fingerprints and iris scans are the most common form when used with electronic access systems. Fingerprints and DNA are the most commonly used in law enforcement.

It should be noted that some security experts have reservations about the factor categories. Specifically all authentication factors are fed into the authentication mechanism as computerized information and are therefore subject to the same possible tampering or forgery as any other information. Digital Certificates for example are essentially passwords that are so long a normal person would never memorize it; it must be stored on a medium (thus termed "something you have"). Similarly anyone who has seen a spy movie has undoubtedly seen a fictional character copy a fingerprint or fake an iris scan. This is possible because the authentication mechanism is reliant on a digital reproduction of the physical item; a digital representation that can be duplicated.

There are many indirect authentication schemes as well. Kerberos is one of the most popular, you authenticate against a central store, which then gives you a token. The token can then be used to grant you access to other systems in lieu of the original authentication mechanism.

Authentication should not be confused with Authorization, which involves granting rights to a specific entity. Authorization schemes are commonly dependent on Authentication to ensure security, but are not the same.

See Wikipedia for more information about Authentication and Security.

2218 questions
4
votes
2 answers

The trust relationship between the primary domain and the trusted domain failed

Scenario: We have an application server (IIS 7.0, Windows 2008 R2) and a seperate database server (SQL 2008) for both our test and production environments (so 4 servers total). Our application server is hosting our custom ASP.Net 4.0 applications.…
Gage
  • 141
  • 1
  • 1
  • 5
4
votes
1 answer

Custom Authentication handler for mod_auth_form?

Apache 2.3/2.4 has mod_auth_form that allows to display a HTML form for users to login. Can I, instead of using a plain HTML form use an application server to provide the form (J2EE, node.js, PHP, Vert.x etc) and the authentication logic and just…
stwissel
  • 680
  • 2
  • 8
  • 22
4
votes
0 answers

Squid Logs NTLM usernames only for certain requests

Currently I have squid 3.2 setup with NTLM authentication and LDAP Group pulls. I also have MySar running to pull the reports. It seems that the way the logging works is by passing them twice, one to authenticate and one to accept. However with…
alucas
  • 41
  • 2
4
votes
2 answers

LDAP Client Authentication using SSSD: Groups issue

I have been able to setup 389 LDAP server and SSSD client authentication. However, whenever I login using ldap user after each login it displays the error ttt@dsl's password: Last login: Thu Dec 6 12:52:06 2012 id: cannot find name for group ID…
chandank
  • 847
  • 3
  • 14
  • 31
4
votes
2 answers

How to add authentication to ssh dynamic port forwarding?

I am using ssh client as a SOCKS server by running on the remote server this command: ssh -f2qTnND *:1080 some-server-user@localhost There is only one problem here: anyone can connect to the server and use it's internet connection. Options: To use…
Aalex Gabi
  • 147
  • 1
  • 7
4
votes
1 answer

ldap-authentication without sambaSamAccount on linux smb/cifs server (e.g. samba)

i'm currently running samba-3.5.6 on a debian/wheezy host to act as the fileserver for our department's w32-clients. authentication is done via OpenLDAP, where each user-dn has an objectclass:sambaSamAccount that holds the smb-credentials and an…
umläute
  • 499
  • 1
  • 7
  • 26
4
votes
1 answer

Apache LDAP auth: denied all time

There is my config (httpd 2.4): LDAPReferrals Off AuthLDAPURL "ldaps://ldap.zzz.com:636/o=zzz.com?uid?sub?(objectClass=*)" AuthLDAPBindDN "uid=zzz,ou=Applications,o=zzz.com" AuthLDAPBindPassword…
Dee
  • 81
  • 6
4
votes
1 answer

add authentication danted socks proxy

So I've been using danted socks proxy the past three weeks and it works great however instead of going in and changing which IPs to allow I want to add authentication to it so only those with the right credentials can use my proxy. I tried it using…
Morgan
  • 41
  • 1
  • 3
4
votes
2 answers

Samba - user auth against AD and local passdb

I have only a short question. Is it possible to set up a samba server, who's able to authenticate some users against Active Directory and some users against a local passdb file? We want to exchange (large) files between company users and our…
Peter Waver
  • 41
  • 1
  • 2
4
votes
1 answer

Weird stuff in in my /var/log/auth.log

I just check my logs on my deed server, I spotted some weird log in the auth.log: Jun 17 22:27:01 mutualab CRON[16249]: pam_unix(cron:session): session opened for user user by (uid=0) Jun 17 22:27:01 mutualab CRON[16249]: pam_unix(cron:session):…
x_vi_r
  • 310
  • 2
  • 4
  • 15
4
votes
4 answers

OTP vs certificate based tokens

I'm currently in the process of researching options for a two-factor authentication system for our company. I'm currently investigating the pros/cons of certificate-based tokens vs. one-time-password (OTP) based tokens (RSA SecurID being the most…
dbr
  • 1,852
  • 3
  • 23
  • 38
4
votes
1 answer

Nginx - basic http authentication on PHP-script

I added a PHP-Script that serves as "cgi-bin", Configuration: location ~^/cgi-bin/.*\.(cgi|pl|py|rb) { gzip off; fastcgi_pass 127.0.0.1:9000; fastcgi_index cgi-bin.php; fastcgi_param SCRIPT_FILENAME /etc/nginx/cgi-bin.php; …
halfbit
  • 163
  • 1
  • 1
  • 8
4
votes
0 answers

How can I password protect an IIS directory with only FTP access?

How can I password protect an IIS directory when I only have FTP access to the server? I can't adjust any IIS settings or add users or anything like that. The answer to: IIS Basic Authorization ala .htaccess/.htpasswd in apache does not help as I…
Tony Adams
  • 163
  • 8
4
votes
2 answers

How are services mapped to the files in /etc/pam.d?

How does pam decide which files in /etc/pam.d to use depending on whether a user logs in via ssh, locally, a serial console, etc?
joeforker
  • 2,399
  • 4
  • 26
  • 35
4
votes
2 answers

Combine Apache authetication providers (file & LDAP)

I'm trying to combine both basic file and LDAP user authentication in an Apache .htaccess file but I can't get both methods to work simultaneously. It's either one or the other. Here's my setup: .htaccess AuthType Basic AuthBasicProvider file…
gurun8
  • 345
  • 1
  • 4
  • 11