Questions tagged [authentication]

A process of proving that an entity (commonly a user or organization) is who they claim to be, or who they were previously identified as being. Authentication does not guarantee that particular entity's identity absolutely, it just proves that they are the same agent that has previously successfully asserted their identity. There are three factors (types) of authentication, and a particular authentication process may combine two or more different factors.

Authentication is critical to systems security. It is the mechanism an authoritative system uses to validate a given entity's asserted identity (who they claim to be) is the same as that entity's stored credentials. Credentials must be previously stored for an entity either by the authoritative system, or by another trusted system, before authentication can occur.

Authentication is commonly used in real life in a number of different scenarios, for example a national border agent confirming a person's identity using a passport.

Authentication usually requires the entity being authenticated to produce one or more tokens. These tokens are then used, possibly alongside other properties or characteristics of the entity, to confirm their identity. An example of an authentication token is a password. These tokens can fall into three broad categories, or factors:

  • Something you know. This is the most commonly used authentication factor in electronic systems. It is most commonly implemented as a password or PIN (personal identification number). This is also the most commonly misused authentication factor. Many system require a secondary security question, such as your mother's maiden name, place you were born in or other such trivia. These all belong to this single factor, thus systems can as as many questions as they like and they are still single factor authentication; all the answers are something the entity would know.
  • Something you have. This is most commonly implemented as a formula number generator (like an RSA Key Fob) or a digital certificate (which can be stored on a smart card or less securely as a simple file on a computer). The Key Fobs, Smart Cards, and SSL Certificates are the most commonly used forms of this factor.
  • Something you are. This is commonly known as biometric security. Fingerprints and iris scans are the most common form when used with electronic access systems. Fingerprints and DNA are the most commonly used in law enforcement.

It should be noted that some security experts have reservations about the factor categories. Specifically all authentication factors are fed into the authentication mechanism as computerized information and are therefore subject to the same possible tampering or forgery as any other information. Digital Certificates for example are essentially passwords that are so long a normal person would never memorize it; it must be stored on a medium (thus termed "something you have"). Similarly anyone who has seen a spy movie has undoubtedly seen a fictional character copy a fingerprint or fake an iris scan. This is possible because the authentication mechanism is reliant on a digital reproduction of the physical item; a digital representation that can be duplicated.

There are many indirect authentication schemes as well. Kerberos is one of the most popular, you authenticate against a central store, which then gives you a token. The token can then be used to grant you access to other systems in lieu of the original authentication mechanism.

Authentication should not be confused with Authorization, which involves granting rights to a specific entity. Authorization schemes are commonly dependent on Authentication to ensure security, but are not the same.

See Wikipedia for more information about Authentication and Security.

2218 questions
16
votes
2 answers

How to allow RDP access based on client certificate

How can I limit (RDP) access to a Windows Server not only by username/password but also with a client certificate? Imagine creating a certificate and copying this to all computers from which I want to be able to access the server from. This would…
kcode
  • 1,825
  • 4
  • 19
  • 21
16
votes
1 answer

postfix sasl "cannot connect to saslauthd server: No such file or directory"

I try to setup postfix with smtp authentication. I want to use /etc/shadow as my realm Unfortunately I get a "generic error" when i try to authenticate # nc localhost 25 220 mail.foo ESMTP Postfix AUTH PLAIN…
user97262
16
votes
14 answers

Alternatives to RSA SecurID?

Have you used, and would recommend, an alternative to RSA SecurID for two-factor authentication?
Toto
  • 738
  • 2
  • 5
  • 11
15
votes
4 answers

Apache authentication : allow public access to a subdirectory

This is probably a simple problem, but I cant find the solution in the documentation. I want to password protect my website using BASIC authentication. But I want a subdirectory to be non protected : http://mysite.com/ ->…
Guillaume
  • 1,063
  • 5
  • 12
  • 24
15
votes
4 answers

Linux Central Authentication/Authorization Methods

I have a small but growing network of Linux servers. Ideally I'd like a central place to control User Access, change passwords, etc... I've read a lot about LDAP servers, but I'm still confused about choosing the best authentication method. Is…
Chris McBride
  • 151
  • 1
  • 1
  • 3
14
votes
2 answers

What do the OS X authorization mechanisms actually do?

Background  I'm trying to glean a better understanding of the OS X login process, in order to decide the best way for achieving VPN Single Sign On. Please do correct me if I'm wrong, but I believe that— launchd(8) calls gettyent(3) and thus…
eggyal
  • 402
  • 5
  • 16
14
votes
3 answers

Which field to use when authenticating against Active Directory?

Active Directory user objects include a number of fields that can be considered an identifier. The following lists some of these with their label in ADUC and their attribute name: Full Name - cn ? - name User sAMAccountName logon -…
dunxd
  • 9,632
  • 22
  • 81
  • 118
14
votes
2 answers

Simple, centralized user management on a small LAN - NIS or LDAP?

I'm setting up a small LAN for my team. It will, for all intents and purposes, not be connected to any external networks. I would like it to have centralized control of user accounts (at least, I think I'd like that; I'm also considering using…
einpoklum
  • 1,652
  • 3
  • 21
  • 31
14
votes
4 answers

How to find all ways in which a Unix user account is locked

I occasionally find myself in a situation where an undermaintained system has an account that's been locked out. The problem is that there are a variety of ways in which an account can be locked out, each with their own method of being…
wfaulk
  • 6,878
  • 7
  • 46
  • 75
14
votes
5 answers

/var/log/auth.log not logging failed ssh attempts

I'm trying to go failed (either incorrect username, password, or both) on my server. I changed /etc/ssh/sshd_config from # Logging SyslogFacility AUTH LogLevel INFO to # Logging SyslogFacility AUTH LogLevel VERBOSE and have since tried multiple…
edev.io
  • 251
  • 1
  • 2
  • 4
14
votes
3 answers

How to automatically configure username/password with proxy PAC file?

I have rather complex proxy setup and one of those proxies requires username/password. Is there a way to configure the username/password so that users don't have to enter them when traffic is redirected to this one proxy? Atleast returning PROXY…
Raynet
  • 511
  • 2
  • 4
  • 11
14
votes
3 answers

libpam-ldap or libpam-ldapd?

I'm setting up LDAP authentication on my personal VPS, and Ubuntu has two packages for the same purpose: libpam-ldap and libpam-ldapd. Which should I use?
jldugger
  • 14,342
  • 20
  • 77
  • 129
13
votes
2 answers

What does dis=NONE mean in an email's Authentication-Results header?

The following is from an email I received recently: Authentication-Results: mx.google.com; spf=neutral; dkim=pass header.i=@yahoo.com; dmarc=pass (p=REJECT dis=NONE) header.from=yahoo.com I've been reading about SPF, DKIM, and…
Alex Henrie
  • 244
  • 1
  • 2
  • 8
13
votes
1 answer

auth.log indicates error with JSchException?

I have a fairly minimal setup server, and it doesn't allow password authentication, only using keys. And it definitely doesn't have Java installed. Normally I don't pay any attention to the thousands of attempts a day of script kiddies to guess my…
Paul Tomblin
  • 5,225
  • 1
  • 28
  • 39
13
votes
2 answers

Why can't I log in to a Windows-protected IIS 7.5 directory on the server?

I have a web site with an admin subdirectory that is protected by integrated Windows authentication. Works flawlessly from remote PCs. But when I attempt to access these pages on the server itself, I get an authorization failure. I'm using the…
user21146
  • 367
  • 1
  • 5
  • 19