Questions tagged [authentication]

A process of proving that an entity (commonly a user or organization) is who they claim to be, or who they were previously identified as being. Authentication does not guarantee that particular entity's identity absolutely, it just proves that they are the same agent that has previously successfully asserted their identity. There are three factors (types) of authentication, and a particular authentication process may combine two or more different factors.

Authentication is critical to systems security. It is the mechanism an authoritative system uses to validate a given entity's asserted identity (who they claim to be) is the same as that entity's stored credentials. Credentials must be previously stored for an entity either by the authoritative system, or by another trusted system, before authentication can occur.

Authentication is commonly used in real life in a number of different scenarios, for example a national border agent confirming a person's identity using a passport.

Authentication usually requires the entity being authenticated to produce one or more tokens. These tokens are then used, possibly alongside other properties or characteristics of the entity, to confirm their identity. An example of an authentication token is a password. These tokens can fall into three broad categories, or factors:

  • Something you know. This is the most commonly used authentication factor in electronic systems. It is most commonly implemented as a password or PIN (personal identification number). This is also the most commonly misused authentication factor. Many system require a secondary security question, such as your mother's maiden name, place you were born in or other such trivia. These all belong to this single factor, thus systems can as as many questions as they like and they are still single factor authentication; all the answers are something the entity would know.
  • Something you have. This is most commonly implemented as a formula number generator (like an RSA Key Fob) or a digital certificate (which can be stored on a smart card or less securely as a simple file on a computer). The Key Fobs, Smart Cards, and SSL Certificates are the most commonly used forms of this factor.
  • Something you are. This is commonly known as biometric security. Fingerprints and iris scans are the most common form when used with electronic access systems. Fingerprints and DNA are the most commonly used in law enforcement.

It should be noted that some security experts have reservations about the factor categories. Specifically all authentication factors are fed into the authentication mechanism as computerized information and are therefore subject to the same possible tampering or forgery as any other information. Digital Certificates for example are essentially passwords that are so long a normal person would never memorize it; it must be stored on a medium (thus termed "something you have"). Similarly anyone who has seen a spy movie has undoubtedly seen a fictional character copy a fingerprint or fake an iris scan. This is possible because the authentication mechanism is reliant on a digital reproduction of the physical item; a digital representation that can be duplicated.

There are many indirect authentication schemes as well. Kerberos is one of the most popular, you authenticate against a central store, which then gives you a token. The token can then be used to grant you access to other systems in lieu of the original authentication mechanism.

Authentication should not be confused with Authorization, which involves granting rights to a specific entity. Authorization schemes are commonly dependent on Authentication to ensure security, but are not the same.

See Wikipedia for more information about Authentication and Security.

2218 questions
1
vote
1 answer

how to securely authenticate users with nginx but not auth_basic?

I want to find a secure but simple method for authenticating users in an Nginx environment. I have succeeded in figuring out the auth_basic mod but that does not meet my needs. I specifically want to supply my own form, get the username and PW,…
DisgruntledUser
  • 101
  • 2
  • 9
1
vote
2 answers

IIS7 basic authentication without windows account

I'm trying to secure an MVC.NET site on IIS7.5 with basic authentication. I'd rather not setup an entire windows account for this as I don't want the user to have that much privilege. I also don't want to implement a data driven authentication…
LaserJesus
  • 133
  • 2
  • 8
1
vote
1 answer

How can I set up an authentication system with single instance storage of credentials and several authentication methods/interfaces?

Background: I have a collection of Linux-based servers (let's say a few dozen) that are hosted in different locations. Some servers are lone satellites while others are hosted together in the same data centers. Some are physical hardware servers,…
1
vote
1 answer

Directory Security failing with Chrome Browser

I have a directory that is protected: (extract from the vhost conf file) allow from all Options -Indexes AuthName "secure data" AuthType Basic require user jack …
RoyHB
  • 163
  • 1
  • 10
1
vote
0 answers

Proxy Authentication Required .NET Application

Here's what I've got setup: Windows Service Account with internet access A .NET application which allows setting the proxy settings Host Port Username Password When running this application the proxy server logs are showing that the credentials…
Jonathan Parker
  • 131
  • 2
  • 8
1
vote
2 answers

How to create a new user and exempt the user of key authentication?

1 I have configured Ubuntu server with Key authentication & it is working fine. I have disabled password authentication for key authentication to work. Server is always accessed via remote terminals or putty. Now all user accounts are able to…
Hrish
  • 87
  • 1
  • 8
1
vote
1 answer

Ubuntu Apache2 - restrict access by IP address

In Ubuntu 11.04, I'm trying to Allow from IP without password prompt, and also allow from any address with password prompt. But it isn't working. Everyone from the Internet can access the page without the password. If I set simple password…
Chetan Crasta
  • 11
  • 1
  • 2
1
vote
1 answer

SMTP auth do not log in on relay server

I'm trying to configure a secondary postfix to enable SMTP AUTH against my main postfix server (postfix + ldap auth + cyrus) I've follow http://www.postfix.org/SASL_README.html#client_sasl adding: smtp_sasl_password_maps =…
magiza83
  • 83
  • 2
  • 10
1
vote
1 answer

email signing with postfix

from: Facebook notification+kr4myw5ewe5n@facebookmail.com reply-to: noreply to: Achal Tomar date: Wed, Jul 11, 2012 at 6:57 PM subject: Abhishek Awasthi tagged a photo of you on…
ACHAL
  • 93
  • 1
  • 13
1
vote
1 answer

Chef with a secured couchdb

I've installed chef , which uses couchdb. It worked fine until i've secured couchdb by creating an admin user in couchdb giving and setting require_valid_user = true in default.ini as written here: http://guide.couchdb.org/draft/security.html Now i…
1
vote
3 answers

How can I disable Kerberos authentication for only the root of my site?

I have Kerberos-based authentication and I want to disable it on only root url: http://mysite.com/. And I want it to continue to work fine on any other page like http://mysite.com/page1. I have such things in my .htaccess: AuthType Kerberos AuthName…
petRUShka
  • 293
  • 2
  • 5
  • 16
1
vote
1 answer

Ubuntu 12.04 - Pound Reverse Proxy and Adobe Flex/Flash Auth

First time posting, I have a completely fresh install of ubuntu 12.04 Client as a reverse proxy gateway to our internal network. Our setup is we have one external ip but three domains we would like to point to various webservers on our internal…
James
  • 83
  • 8
1
vote
2 answers

Jersey web-service token based on hostname

I recently built a RESTful service using Jersey and is currently used by 3 other systems internal to the network (not people). How can I make sure the requests to the service are honored only based on hostname/IP address. The service is local to…
1
vote
2 answers

Authenticating Linked Servers - SQL Server 8 to SQL Server 10

We have an old SQL Server 2000 database that has to be kept because it is needed on our manufacturing machines. It also maintains our employee records, since they are needed on these machines for employee logins. We also have a newer SQL Server 10…
jp2code
  • 175
  • 2
  • 13
1
vote
1 answer

SSL Certificates, two-way authentication and loadbalancers

We're looking to implement two-way authentication with client certificates for a privileged subset of our application users. The idea will be that if a certificate is detected the user will be asked for an additional password/PIN and that will be…
immutabl
  • 213
  • 2
  • 9