Questions tagged [authentication]

A process of proving that an entity (commonly a user or organization) is who they claim to be, or who they were previously identified as being. Authentication does not guarantee that particular entity's identity absolutely, it just proves that they are the same agent that has previously successfully asserted their identity. There are three factors (types) of authentication, and a particular authentication process may combine two or more different factors.

Authentication is critical to systems security. It is the mechanism an authoritative system uses to validate a given entity's asserted identity (who they claim to be) is the same as that entity's stored credentials. Credentials must be previously stored for an entity either by the authoritative system, or by another trusted system, before authentication can occur.

Authentication is commonly used in real life in a number of different scenarios, for example a national border agent confirming a person's identity using a passport.

Authentication usually requires the entity being authenticated to produce one or more tokens. These tokens are then used, possibly alongside other properties or characteristics of the entity, to confirm their identity. An example of an authentication token is a password. These tokens can fall into three broad categories, or factors:

  • Something you know. This is the most commonly used authentication factor in electronic systems. It is most commonly implemented as a password or PIN (personal identification number). This is also the most commonly misused authentication factor. Many system require a secondary security question, such as your mother's maiden name, place you were born in or other such trivia. These all belong to this single factor, thus systems can as as many questions as they like and they are still single factor authentication; all the answers are something the entity would know.
  • Something you have. This is most commonly implemented as a formula number generator (like an RSA Key Fob) or a digital certificate (which can be stored on a smart card or less securely as a simple file on a computer). The Key Fobs, Smart Cards, and SSL Certificates are the most commonly used forms of this factor.
  • Something you are. This is commonly known as biometric security. Fingerprints and iris scans are the most common form when used with electronic access systems. Fingerprints and DNA are the most commonly used in law enforcement.

It should be noted that some security experts have reservations about the factor categories. Specifically all authentication factors are fed into the authentication mechanism as computerized information and are therefore subject to the same possible tampering or forgery as any other information. Digital Certificates for example are essentially passwords that are so long a normal person would never memorize it; it must be stored on a medium (thus termed "something you have"). Similarly anyone who has seen a spy movie has undoubtedly seen a fictional character copy a fingerprint or fake an iris scan. This is possible because the authentication mechanism is reliant on a digital reproduction of the physical item; a digital representation that can be duplicated.

There are many indirect authentication schemes as well. Kerberos is one of the most popular, you authenticate against a central store, which then gives you a token. The token can then be used to grant you access to other systems in lieu of the original authentication mechanism.

Authentication should not be confused with Authorization, which involves granting rights to a specific entity. Authorization schemes are commonly dependent on Authentication to ensure security, but are not the same.

See Wikipedia for more information about Authentication and Security.

2218 questions
10
votes
2 answers

How to stop Outlook 2007 asking for credentials when using RPC over HTTPS

I've configured several of our outlook 2007 clients (connected to Exchange 2003) to use RPC over HTTPS. This allows our users to connect to the Exchange server remotely without having to connect using VPN tunnels. All the computers are domain…
Bryan
  • 7,628
  • 15
  • 69
  • 94
10
votes
2 answers

How to debug Samba authorization (authentication) procedure

I'm running a small home network linux-based server which acts as an internet router, torrent client and file server. I have problems connecting Windows clients to server Samba shares ('user name or password is invalid'). How can I enable logging of…
mbaitoff
  • 355
  • 2
  • 3
  • 9
10
votes
2 answers

Active Directory Authentication with LDAP proxy

We have a services in a isolated network. These services need to authenticate users against the Active Directory server. However the Active Directory server is not directly available so I have to setup a LDAP proxy in the isolated network. The LDAP…
SamK
  • 1,356
  • 3
  • 14
  • 28
10
votes
4 answers

OpenSSH : Key-based authorization, maximum key length

I'am using Putty on windows with key-based authentication to access some of mine servers. It works totally fine with ~3700-bit key, but with ~17000-bit key it thinks for like 20 seconds on client-side and then just says "Access denied" and asks for…
BarsMonster
  • 724
  • 4
  • 12
  • 26
10
votes
5 answers

How to secure a directory in Apache using a PHP session

I have a site that uses PHP session for authentication. There is one directory that I would like to restrict access to that does not use any PHP, it's just full of static content. I just don't know how to restrict access without every request going…
Cogsy
  • 237
  • 1
  • 2
  • 7
10
votes
3 answers

Easiest way to get an Active Directory server for testing

We're developing a .net application, and are about to add authentication to it. We'd like to use Active Directory for this, but are aiming to make this as simple as possible for the test-server used for development. What does it take to get Active…
stiank81
  • 203
  • 1
  • 2
  • 8
10
votes
2 answers

How does DKIM work when sending emails from multiple sources/servers?

So if I'm understanding DKIM correctly, it basically is a public/private key type of service. However, how does this work if you send emails from multiple servers/sources? For instance, I have a split domain where I send some emails (under the…
Marc NJ
  • 111
  • 1
  • 4
9
votes
0 answers

LDAP: creating a bind user with limited privileges

I need to bind to an OpenLDAP server to authenticate users, but I don't want this low-privileged or "delegated administrator" to be able to see more attributes than strictly necessary. How do I reduce the attributes a bind user can see using a…
lorenzog
  • 2,799
  • 3
  • 20
  • 24
9
votes
2 answers

Windows Authentication behaves oddly when VPN'd

We've got a few apps that rely on windows authentication - a couple of web apps with AD auth turned on and we usually connect to our SQL servers with windows auth. This normally runs without a hitch. It doesn't work so well if we're VPN'd to a…
Dan F
  • 143
  • 1
  • 1
  • 7
9
votes
3 answers

How to use OpenSSH certificates on Windows?

OpenSSH supports signing user keys with a certificate authority. From man ssh-keygen: ssh-keygen supports signing of keys to produce certificates that may be used for user or host authentication. Certificates consist of a public key, some identity…
Stephane Martin
  • 227
  • 1
  • 2
  • 9
9
votes
1 answer

How can I get sshd to tell me why it's failing public key authentications?

I'm using OpenSSH 6.9p1 (on Lubuntu) as my SSH server. When trying to connect to it (using an SSH client in Cygwin), I keep being reverted to password authentication, despite having properly generated my keys, put them in the authorized key file on…
einpoklum
  • 1,652
  • 3
  • 21
  • 31
9
votes
1 answer

OpenVPN certificate OR plugin-auth-pam authentication

Configuring OpenVPN server, I can enable either certificate-based authentication or username/password authentication using openvpn-plugin-auth-pam plugin, but not both at the same time. I enable username/password authentication as follows: plugin…
Andrei
  • 201
  • 2
  • 4
9
votes
0 answers

Unix nslcd login with sAMAccountName and/or userPrincipalName from Active Directory

I'm trying to setup authentication from Active Directory in FreeBSD 10.0 using nslcd (nss-pam-ldapd-sasl package) and would like to allow both sAMAccountName and userPrincipalName as valid login attributes in the server. I don't know if it's…
Vinícius Ferrão
  • 5,520
  • 11
  • 55
  • 95
9
votes
4 answers

Authenticate in Apache via System Account

I currently have my apache server to authenticate via a password file created from htpasswd. Configured as such: AuthType Basic AuthName "Secured Site" AuthUserFile "/etc/apache2/users.passwd" How can I change this to authenticate via local system…
Mark Roddy
  • 777
  • 2
  • 11
  • 13
9
votes
3 answers

Possible? OpenVPN server requiring both certificate- AND password-based login (via Tomato router firmware)

I've been using Shibby's build of Tomato (64k NVRAM version) on my Asus N66U router in order to run an OpenVPN server. I'm curious whether it's possible to setup this OpenVPN server to require both a certificate AND a username/password before a user…
Eric
  • 237
  • 1
  • 6
  • 12