Questions tagged [authentication]

A process of proving that an entity (commonly a user or organization) is who they claim to be, or who they were previously identified as being. Authentication does not guarantee that particular entity's identity absolutely, it just proves that they are the same agent that has previously successfully asserted their identity. There are three factors (types) of authentication, and a particular authentication process may combine two or more different factors.

Authentication is critical to systems security. It is the mechanism an authoritative system uses to validate a given entity's asserted identity (who they claim to be) is the same as that entity's stored credentials. Credentials must be previously stored for an entity either by the authoritative system, or by another trusted system, before authentication can occur.

Authentication is commonly used in real life in a number of different scenarios, for example a national border agent confirming a person's identity using a passport.

Authentication usually requires the entity being authenticated to produce one or more tokens. These tokens are then used, possibly alongside other properties or characteristics of the entity, to confirm their identity. An example of an authentication token is a password. These tokens can fall into three broad categories, or factors:

  • Something you know. This is the most commonly used authentication factor in electronic systems. It is most commonly implemented as a password or PIN (personal identification number). This is also the most commonly misused authentication factor. Many system require a secondary security question, such as your mother's maiden name, place you were born in or other such trivia. These all belong to this single factor, thus systems can as as many questions as they like and they are still single factor authentication; all the answers are something the entity would know.
  • Something you have. This is most commonly implemented as a formula number generator (like an RSA Key Fob) or a digital certificate (which can be stored on a smart card or less securely as a simple file on a computer). The Key Fobs, Smart Cards, and SSL Certificates are the most commonly used forms of this factor.
  • Something you are. This is commonly known as biometric security. Fingerprints and iris scans are the most common form when used with electronic access systems. Fingerprints and DNA are the most commonly used in law enforcement.

It should be noted that some security experts have reservations about the factor categories. Specifically all authentication factors are fed into the authentication mechanism as computerized information and are therefore subject to the same possible tampering or forgery as any other information. Digital Certificates for example are essentially passwords that are so long a normal person would never memorize it; it must be stored on a medium (thus termed "something you have"). Similarly anyone who has seen a spy movie has undoubtedly seen a fictional character copy a fingerprint or fake an iris scan. This is possible because the authentication mechanism is reliant on a digital reproduction of the physical item; a digital representation that can be duplicated.

There are many indirect authentication schemes as well. Kerberos is one of the most popular, you authenticate against a central store, which then gives you a token. The token can then be used to grant you access to other systems in lieu of the original authentication mechanism.

Authentication should not be confused with Authorization, which involves granting rights to a specific entity. Authorization schemes are commonly dependent on Authentication to ensure security, but are not the same.

See Wikipedia for more information about Authentication and Security.

2218 questions
11
votes
1 answer

How to specify multiple root certificates for nginx client certificate verification?

For a project as part of the European Grid Infrastructure (EGI) we need SSL client certificate verification for a service running on nginx. As there are several root CAs allowed within EGI, we need nginx to check them all during client certificate…
Florian Feldhaus
  • 251
  • 2
  • 4
  • 11
11
votes
7 answers

is it okay to use random URLs instead of passwords?

Is it considered "safe" to use URL constructed from random characters like this? http://example.com/EU3uc654/Photos I'd like to put some files/picture galleries on a webserver that are only to be accessed by a small group of users. My main concern…
stew
  • 221
  • 2
  • 5
11
votes
1 answer

Definition of BUILTIN\Users?

For a server on a Windows Domain, what is the membership of "BUILTIN\Users" exactly? (I figure this has an obvious answer, but googling hasn't given me any clear definitions)
codeulike
  • 1,008
  • 5
  • 17
  • 29
11
votes
5 answers

How to use Active Directory to authenticate linux users

What are the best-practices for using Active Directory to authenticate users on linux (Debian) boxes? The way I would like it to work would be to add AD users to a group - say linux administrators or linux webserver, and based on their group…
Brent
  • 22,857
  • 19
  • 70
  • 102
11
votes
4 answers

How can I enable both password and public key authentication with OpenSSH

I would like for sshd to verify the users' public key and then prompt for their password, rather than just one or the other. Is this possible?
surprise_
  • 213
  • 1
  • 2
  • 6
11
votes
3 answers

Is SSH logging capabilities equivalent to su logging for private/public key authentication?

Here at work, we have a non-root shared login account on UNIX that is used to admin a particular application. The policy is to not allow direct logins to the shared account; you must login as yourself and use the "su" command to change over to the…
David I.
  • 211
  • 1
  • 4
10
votes
5 answers

How can I set up Redmine => Active Directory authentication?

First, I'm not an AD admin on site, but my manager has asked me to try to get my personal Redmine installation to integrate with ActiveDirectory in order to test-drive it for a larger-scale rollout. Our AD server is at host:port ims.example.com:389…
Chris R
  • 533
  • 1
  • 5
  • 20
10
votes
6 answers

Enforce SSH key passwords?

I'm looking at removing password-based logins for SSH. However, I don't want to allow passwordless ssh keys, as that would be even worse. How can I make sure that only SSH keys which have passwords can connect? If this can't be done, are there…
Lee B
  • 3,460
  • 1
  • 17
  • 15
10
votes
0 answers

Active Directory + Google Authenticator - Native support in Windows Server?

Use Case: 2FA to log in to Active Directory (such as logging into a corporate desktop computer that is on AD) Desired Solution: Google Authenticator-style, RFC based MFA system. This path is compelling because it is RFC based, and widely used for…
Jonesome Reinstate Monica
  • 5,445
  • 10
  • 56
  • 82
10
votes
2 answers

Create user in gitlab without e-mail?

I'm testing out omnibus gitlab on a local VM. After disabling anonymous signup, I tried adding a new user via the /admin/users/new page. It requires I associate an e-mail with the new user account, and it further doesn't permit me to specify a…
Parthian Shot
  • 1,165
  • 4
  • 16
  • 32
10
votes
4 answers

home dir and shell for Active Directory authenticated users

I have successfully configured sssd and can ssh into a system with AD credentials what I am missing is the creation of a home directory and bash set as the shell. My assumption is that if I log on to a system that does not already have a local linux…
grahamjgreen
  • 951
  • 2
  • 8
  • 12
10
votes
1 answer

LDAP authentication for SonicWALL VPN

I'm trying to configure my SonicWALL to allow LDAP authentication for VPN users. I've done this before with another device, and I remember it being pretty simple. But I can't get it to work this time for the life of me. When I enable "LDAP +…
colemanm
  • 659
  • 5
  • 10
  • 25
10
votes
6 answers

How to enable negotiate authentication for winrm

I have disabled negotiate authentication for the winrm service on my server by executing: winrm put winrm/config/service/Auth @{Negotiate="false"} And now I can perform any operation with winrm. I get the error: Message = The WinRM client…
Ivaylo Strandjev
  • 223
  • 1
  • 2
  • 6
10
votes
3 answers

iptables, allow access from certain MAC addresses

Presently, I limit which clients can access my server by using IP addresses via iptables, only approved IP addresses can connect. However, the problem with this is if a client is on a laptop and goes to a different location, they can no longer…
user788171
  • 279
  • 1
  • 5
  • 13
10
votes
1 answer

AD Cross-forest authentication - groups missing from PAC

I have an Active Directory setup consisting of 2 forests: 1 multi-domain forest with 1 forest root domain, and 2 direct child domains 1 single-domain forest for DMZ publishing purposes I have created 3 outgoing trusts in the DMZ domain, 1…