Questions tagged [authentication]

A process of proving that an entity (commonly a user or organization) is who they claim to be, or who they were previously identified as being. Authentication does not guarantee that particular entity's identity absolutely, it just proves that they are the same agent that has previously successfully asserted their identity. There are three factors (types) of authentication, and a particular authentication process may combine two or more different factors.

Authentication is critical to systems security. It is the mechanism an authoritative system uses to validate a given entity's asserted identity (who they claim to be) is the same as that entity's stored credentials. Credentials must be previously stored for an entity either by the authoritative system, or by another trusted system, before authentication can occur.

Authentication is commonly used in real life in a number of different scenarios, for example a national border agent confirming a person's identity using a passport.

Authentication usually requires the entity being authenticated to produce one or more tokens. These tokens are then used, possibly alongside other properties or characteristics of the entity, to confirm their identity. An example of an authentication token is a password. These tokens can fall into three broad categories, or factors:

  • Something you know. This is the most commonly used authentication factor in electronic systems. It is most commonly implemented as a password or PIN (personal identification number). This is also the most commonly misused authentication factor. Many system require a secondary security question, such as your mother's maiden name, place you were born in or other such trivia. These all belong to this single factor, thus systems can as as many questions as they like and they are still single factor authentication; all the answers are something the entity would know.
  • Something you have. This is most commonly implemented as a formula number generator (like an RSA Key Fob) or a digital certificate (which can be stored on a smart card or less securely as a simple file on a computer). The Key Fobs, Smart Cards, and SSL Certificates are the most commonly used forms of this factor.
  • Something you are. This is commonly known as biometric security. Fingerprints and iris scans are the most common form when used with electronic access systems. Fingerprints and DNA are the most commonly used in law enforcement.

It should be noted that some security experts have reservations about the factor categories. Specifically all authentication factors are fed into the authentication mechanism as computerized information and are therefore subject to the same possible tampering or forgery as any other information. Digital Certificates for example are essentially passwords that are so long a normal person would never memorize it; it must be stored on a medium (thus termed "something you have"). Similarly anyone who has seen a spy movie has undoubtedly seen a fictional character copy a fingerprint or fake an iris scan. This is possible because the authentication mechanism is reliant on a digital reproduction of the physical item; a digital representation that can be duplicated.

There are many indirect authentication schemes as well. Kerberos is one of the most popular, you authenticate against a central store, which then gives you a token. The token can then be used to grant you access to other systems in lieu of the original authentication mechanism.

Authentication should not be confused with Authorization, which involves granting rights to a specific entity. Authorization schemes are commonly dependent on Authentication to ensure security, but are not the same.

See Wikipedia for more information about Authentication and Security.

2218 questions
9
votes
2 answers

Network authentication + roaming home directory - which technology should I look into using?

I'm looking into software which provides a user with a single identity across multiple computers. That is, a user should have the same permissions on each computer, and the user should have access to all of his or her files (roaming home directory)…
Brian
  • 93
  • 1
  • 3
9
votes
2 answers

get the authenticated user under apache

Using Apache 2.2 on Windows with mod_auth_sspi and mod_headers. I'm trying to pass the current authenticated user through to the proxy target in the X-Remote-User header. I expect that this is simple, but I've been wrangling Apache for an hour now…
brofield
  • 260
  • 1
  • 3
  • 12
9
votes
2 answers

Is SSH Key Exchange more secure than password authentication?

Remote users connect to several services at our main office over the internet using SSH. The SSH password is synchronized with their LAN A/D account. Would having users bring a copy of an SSH key home using something like a CD or a piece of paper…
srmark
  • 321
  • 1
  • 4
  • 9
9
votes
1 answer

Authenticate http requests EXCEPT for from this IP

I've got Nagios running on a server here (CentOS 5.3 w/ Apache 2.2.3-22.el5.centos) authenticating to my LDAP server, and all works well. However, I'd like to have some IP able to see the Nagios status page without authenticating. Nagios has this…
Bill Weiss
  • 10,979
  • 3
  • 38
  • 66
8
votes
1 answer

PuTTY slow connecting to Linux SSH server

When connecting to a Linux SSH server using PuTTY, the PuTTY log shows 2 authentication attempts. The first attempt uses "root" as the username and no password. "none" is displayed in the first packet, meaning no password was used. The connection…
JeremyCanfield
  • 413
  • 4
  • 11
  • 17
8
votes
3 answers

Enable password login for SFTP while keeping authentication by SSH keys

How do I keep a password login enabled for SFTP transactions (made by Drupal, if this is important) while keeping it disabled for all other SSH key based authentications? Currently all the existing users of the CentOS server use keys to log in and…
Dr NYU
  • 93
  • 1
  • 1
  • 7
8
votes
14 answers

can't figure out why apache LDAP auth fails

Suddenly, yesterday, one of my apache servers became unable to connect to my LDAP (AD) server. I have two sites running on that server, both of which use LDAP to auth against my AD server when a user logs in to either site. It had been working…
SethG
  • 314
  • 1
  • 3
  • 7
8
votes
1 answer

Disable authentication for HTTP OPTIONS method (preflight request)

One recurring problem with CORS is that the spec prescribes request headers get stripped from the preflight request (HTTP OPTIONS). However if the server requires authentication, this means the preflight request will fail (because the Authorization…
Jeroen Ooms
  • 2,239
  • 8
  • 34
  • 51
8
votes
4 answers

Which ports are required in order to authenticate against a ldap server in another domain which is behind a firewall?

I have a Linux domain running with sssd, let's call this domain NJ. I'd like machines on the NJ domain to be able to authenticate against an Active Directory ldap server which resides on a different domain (called NY) which is behind a…
Itai Ganot
  • 10,644
  • 29
  • 93
  • 146
8
votes
2 answers

How to set the username and password for smtpd in Postfix?

I've set up Postfix as SMTP server by adding this configuration to main.cf: myhostname = foo.com mydomain = foo.com myorigin = $mydomain smtpd_sasl_path = private/auth smtpd_sasl_auth_enable = yes broken_sasl_auth_clients =…
Overv
  • 182
  • 1
  • 1
  • 8
8
votes
1 answer

How to prevent browser from prompting for a client certificate and allow the IIS to accept it (not require it)?

In a web application, I have a WCF service uses Client Certificate authentication. I checked "Accept Client Certificate" in IIS - SSL Settings and it works fine. But some times, in some browsers, if a certificate is installed on the client machine,…
Homam
  • 253
  • 1
  • 3
  • 7
8
votes
2 answers

Is single sign on with LDAP still recommended today to integrate a bunch of open source tools?

We are leading an exercise with a public institution to install different open source tools for them to experiment and see what suits them most. Thus, we are installing: a wiki (dokuwiki) mediagoblin gnu social etherpad ethercalc and possibly…
transient_loop
  • 499
  • 1
  • 4
  • 15
8
votes
1 answer

Testing NTLM/Kerberos against a public URL

I am creating a Java open source package that makes it easy to connect with HttpClient 3.1 to resources that are protected by NTLm v1/v2 and Kerberos. I need to test this tool against real world servers. Are there any publicly available endpoints…
dov.amir
  • 190
  • 1
  • 5
8
votes
3 answers

Apache basic auth for a particular URL

I have a site in production that I want to modify (translate from French to English). The modified part will be placed in the domain.com/en URL location and I want to protect only this part with a basic HTTP auth during the modifications. I would…
Fabien Quatravaux
  • 273
  • 1
  • 2
  • 7
8
votes
4 answers

Active Directory authentication load balancing and failover

For applications that authenticate against an Active Directory DC, obviously it would be best to just point them to the main domain DNS record rather than a specific DC for failover, load balancing, etc. What are best practices for those…
Derrick
  • 165
  • 1
  • 2
  • 9