Questions tagged [authentication]

A process of proving that an entity (commonly a user or organization) is who they claim to be, or who they were previously identified as being. Authentication does not guarantee that particular entity's identity absolutely, it just proves that they are the same agent that has previously successfully asserted their identity. There are three factors (types) of authentication, and a particular authentication process may combine two or more different factors.

Authentication is critical to systems security. It is the mechanism an authoritative system uses to validate a given entity's asserted identity (who they claim to be) is the same as that entity's stored credentials. Credentials must be previously stored for an entity either by the authoritative system, or by another trusted system, before authentication can occur.

Authentication is commonly used in real life in a number of different scenarios, for example a national border agent confirming a person's identity using a passport.

Authentication usually requires the entity being authenticated to produce one or more tokens. These tokens are then used, possibly alongside other properties or characteristics of the entity, to confirm their identity. An example of an authentication token is a password. These tokens can fall into three broad categories, or factors:

  • Something you know. This is the most commonly used authentication factor in electronic systems. It is most commonly implemented as a password or PIN (personal identification number). This is also the most commonly misused authentication factor. Many system require a secondary security question, such as your mother's maiden name, place you were born in or other such trivia. These all belong to this single factor, thus systems can as as many questions as they like and they are still single factor authentication; all the answers are something the entity would know.
  • Something you have. This is most commonly implemented as a formula number generator (like an RSA Key Fob) or a digital certificate (which can be stored on a smart card or less securely as a simple file on a computer). The Key Fobs, Smart Cards, and SSL Certificates are the most commonly used forms of this factor.
  • Something you are. This is commonly known as biometric security. Fingerprints and iris scans are the most common form when used with electronic access systems. Fingerprints and DNA are the most commonly used in law enforcement.

It should be noted that some security experts have reservations about the factor categories. Specifically all authentication factors are fed into the authentication mechanism as computerized information and are therefore subject to the same possible tampering or forgery as any other information. Digital Certificates for example are essentially passwords that are so long a normal person would never memorize it; it must be stored on a medium (thus termed "something you have"). Similarly anyone who has seen a spy movie has undoubtedly seen a fictional character copy a fingerprint or fake an iris scan. This is possible because the authentication mechanism is reliant on a digital reproduction of the physical item; a digital representation that can be duplicated.

There are many indirect authentication schemes as well. Kerberos is one of the most popular, you authenticate against a central store, which then gives you a token. The token can then be used to grant you access to other systems in lieu of the original authentication mechanism.

Authentication should not be confused with Authorization, which involves granting rights to a specific entity. Authorization schemes are commonly dependent on Authentication to ensure security, but are not the same.

See Wikipedia for more information about Authentication and Security.

2218 questions
21
votes
5 answers

SSH Public Key Format

I have a public key in the format: ---- BEGIN SSH2 PUBLIC KEY ---- Comment: "somename-20060227" AAAAB3NzaC1yc2EAAAABJQAAAIBmhLUTJiP[and so on]== ---- END SSH2 PUBLIC KEY ---- Usually I see keys in the format like this: ssh-rsa…
Björn
  • 425
  • 2
  • 4
  • 9
21
votes
3 answers

Unable to connect to the AWS EC2 instance - "Host key verification failed"

I had set up a Ubuntu instance with a Rails package, deployed my app, and it is working fine. But when I try to do SSH, it's not allowing me for the remote login and throws errors like: Host key verification failed. The problem seem to be…
Jeevan Dongre
  • 741
  • 2
  • 17
  • 33
21
votes
5 answers

How practical is it to authenticate a Linux server against AD?

We utilise both Windows and Linux server at our software development company. One of the friction points with this setup is that we don't have a single sign-on solution. Being more of a Microsoft shop than a Linux one we want to authenticate…
Philip Fourie
  • 537
  • 2
  • 6
  • 13
20
votes
2 answers

Receiving a private key from server admin: ok or not?

I am to get access to a remote SFTP server. The admin has created a user for me, and generated a public/private key pair for me. Then he securely sent me the private key file, which I use for authentication. I believe this is not good, I should be…
matthiash
  • 311
  • 2
  • 3
20
votes
2 answers

The Story of secure user-authentication in squid

once upon a time, there was a beautiful warm virtual-jungle in south america, and a squid server lived there. here is an perceptual image of the network: | | …
Isaac
  • 581
  • 2
  • 12
  • 25
19
votes
4 answers

How to make Ansible use password if key was rejected?

My new server instances are configured to login on root via ssh with password. I want my Ansible playbook to reconfigure it to use keys instead and disable root login with password on first run, so I need something like this: try to login with…
petr0
  • 313
  • 1
  • 2
  • 8
19
votes
1 answer

Windows IIS Authentication not working with FQDN but is without it

I have an Intranet website, not internet, and whenever I go to http://mysite The website accepts my integrated authentication of the logged in user on the computer/client via IE. if I go to the FQDN http://mysite.something.com I get prompted for…
johnny
  • 2,328
  • 9
  • 37
  • 57
19
votes
2 answers

Setting Mercurial with Active Directory authentication and authorisation

I am evaluating the possibilities of moving my organisation to Mercurial, however I am stumbling on two basic requirements which I can't find proper pointers to. How do I set up Mercurial's central repository to authenticate users with the central…
jbx
18
votes
5 answers

Kerberos Authentication for workstations not on domain

I have a base understanding of how Kerberos works in an Active Directory environment and the methods it uses to authenticate users and workstations onto the network, but my question is.. since Kerberos relies on issuing a security token that the end…
Eric
  • 185
  • 1
  • 1
  • 4
18
votes
4 answers

Good Shibboleth tutorials out there?

I am looking into using Shibboleth for authentication of webapplications at my organisation. I am very new to this subject and would like to read through some good tutorials, hands-on-lessons or whatever is out there to help newbies getting to know…
fgysin
  • 448
  • 2
  • 5
  • 15
18
votes
6 answers

Is OpenID this easy to hack or am I missing something?

For those Relying Parties (RP) that allow the user to specify the OpenID Provider (OP), it seems to me than anyone that knows or guesses your OpenID could Enter their own OP address. Have it validate them as owning your OpenID. Access your account…
David
  • 181
  • 1
  • 3
17
votes
2 answers

Microsoft SQL Server login using Active Directory Credentials

Our Microsoft SQL Servers are running on Windows Servers which are part of an Active Directory domain. For easy user management, our SQL authorization is set up by using the Active Directory User Groups as explained in this post. Now this works fine…
17
votes
5 answers

How can I clear the "authentication cache" in Windows 7 to a password protected samba share?

I have a Linux samba server and have explicitly listed users that can access the folder. I have successfully congfigured Samba to require a username and password when accessing the share from windows (using the smbpasswd, etc.). But now I want to…
Chris Drumgoole
  • 315
  • 1
  • 4
  • 9
16
votes
7 answers

Use LDAP for MySQL authentication?

We run a couple dozen different MySQL servers for our users. These use the free/Open Source version of MySQL, not the commercial version. Managing the Account Passwords on these servers is painful. Are there any plugins which would allow us to use…
Stefan Lasiewski
  • 23,667
  • 41
  • 132
  • 186
16
votes
9 answers

Web interface to allow users to change their Active Directory password

I have a few web applications that use Active Directory to authenticate. What I would like to be able to do is provide a simple web page that would allow users to update their AD password. This wasn't a problem when the majority of the users had…
csexton
  • 487
  • 1
  • 5
  • 12