Questions tagged [authentication]

A process of proving that an entity (commonly a user or organization) is who they claim to be, or who they were previously identified as being. Authentication does not guarantee that particular entity's identity absolutely, it just proves that they are the same agent that has previously successfully asserted their identity. There are three factors (types) of authentication, and a particular authentication process may combine two or more different factors.

Authentication is critical to systems security. It is the mechanism an authoritative system uses to validate a given entity's asserted identity (who they claim to be) is the same as that entity's stored credentials. Credentials must be previously stored for an entity either by the authoritative system, or by another trusted system, before authentication can occur.

Authentication is commonly used in real life in a number of different scenarios, for example a national border agent confirming a person's identity using a passport.

Authentication usually requires the entity being authenticated to produce one or more tokens. These tokens are then used, possibly alongside other properties or characteristics of the entity, to confirm their identity. An example of an authentication token is a password. These tokens can fall into three broad categories, or factors:

  • Something you know. This is the most commonly used authentication factor in electronic systems. It is most commonly implemented as a password or PIN (personal identification number). This is also the most commonly misused authentication factor. Many system require a secondary security question, such as your mother's maiden name, place you were born in or other such trivia. These all belong to this single factor, thus systems can as as many questions as they like and they are still single factor authentication; all the answers are something the entity would know.
  • Something you have. This is most commonly implemented as a formula number generator (like an RSA Key Fob) or a digital certificate (which can be stored on a smart card or less securely as a simple file on a computer). The Key Fobs, Smart Cards, and SSL Certificates are the most commonly used forms of this factor.
  • Something you are. This is commonly known as biometric security. Fingerprints and iris scans are the most common form when used with electronic access systems. Fingerprints and DNA are the most commonly used in law enforcement.

It should be noted that some security experts have reservations about the factor categories. Specifically all authentication factors are fed into the authentication mechanism as computerized information and are therefore subject to the same possible tampering or forgery as any other information. Digital Certificates for example are essentially passwords that are so long a normal person would never memorize it; it must be stored on a medium (thus termed "something you have"). Similarly anyone who has seen a spy movie has undoubtedly seen a fictional character copy a fingerprint or fake an iris scan. This is possible because the authentication mechanism is reliant on a digital reproduction of the physical item; a digital representation that can be duplicated.

There are many indirect authentication schemes as well. Kerberos is one of the most popular, you authenticate against a central store, which then gives you a token. The token can then be used to grant you access to other systems in lieu of the original authentication mechanism.

Authentication should not be confused with Authorization, which involves granting rights to a specific entity. Authorization schemes are commonly dependent on Authentication to ensure security, but are not the same.

See Wikipedia for more information about Authentication and Security.

2218 questions
1
vote
2 answers

AD Authentication fails in local machine but works from Production server

Hi, I am using AD authentication and facing 2 problems. Authentication works fine when I move the application to a production server but FAILS in my LOCAL machine. Both local machine and server are in same domain and used the same domain account…
jesu
  • 11
  • 1
1
vote
1 answer

How can I use different database realm for different "instances" of an application for authentication?

I have a web application on apache/httpd. By copying this application and putting it in a different directory under document root, I creat a new instance of that application. I do set up a new database for each instance as well. I use database…
Nicsoft
  • 203
  • 6
  • 15
1
vote
6 answers

Change Active Directory password over VPN

We've got a few users in a remote office that only access any of the servers through the SonicWALL Global VPN Client. Their machines are members of the Active Directory domain here, so they can access Exchange mail and network shares while the VPN…
1
vote
2 answers

I want to get header response of a url using a proxy with a username, password, host and port?

I want to get header response of a URL by using proxy username, password, host and port? is there any Linux command to get the same response?
1
vote
3 answers

Why cannot login in to the server via SSH?

The network connection is OK as I can ping that server. However, I cannot SSH to it by any user. The output as follows, Auth User/Pass with PS...fail...Please reconnect!. Connection to xxx closed. There is no problem of my password. Is it due to…
northtree
  • 161
  • 1
  • 5
1
vote
2 answers

How do I configure SAMBA to use ADS & SMBPASSWD authentication?

I'm using Beyond Trust to integrate with active directory on a CentOS 5.6 server. I'm using the interop-install that comes with Beyond Trust to configure SAMBA, which works fine. However, I have some local accounts that I want to still work & for…
churnd
  • 4,077
  • 5
  • 34
  • 42
1
vote
4 answers

SSH key based authentication in Perl server

I have a server written in Perl that clients connect to in order to perform some management tasks. Without going into details I would like to achieve two things: encrypt connection channel between server and client - it can be done with…
ahes
  • 95
  • 1
  • 2
  • 10
1
vote
3 answers

How can I use PAM to restrict telnet login by user?

Regrettably I need to enable telnet for a single user on a Linux machine. Everyone else will have to use ssh. How do I configure PAM to restrict which users may login via the telnet server?
joeforker
  • 2,399
  • 4
  • 26
  • 35
1
vote
0 answers

Remote access to IIS 5.1 via NTLM

I'm trying to configure remote access to IIS 5.1 web server on a virtual xp machine. The web server is used to expose a ASP.NET web service. I want to access the web service using Java client by using NTLM authentication. So I'm making a prototype…
mateusz.fiolka
  • 153
  • 1
  • 5
1
vote
2 answers

How to allow just one user to login in special computer in Server 2003

I want to just allow one user to login to a special computer in domain. how can i do that ?
Omid Amraei
  • 175
  • 2
  • 2
  • 13
1
vote
3 answers

Avoid user lookup in active directory trusted domains from samba

Trying to set up a linux server to authenticate users on the corporate active directory we're facing a problem. We're using SAMBA, winbind, krb5 and PAM. The problem arises when trying to list users from the system. winbind tries to look them up in…
chmeee
  • 7,370
  • 3
  • 30
  • 43
1
vote
1 answer

Is it possible to get svn to authentication with windows/sspi, but with username aliases?

I have a VisualSVN server running on Windows 2008 R2 x64 using basic authentication. I want to upgrade to use windows authentication. However, some of the usernames set up do not match the domain usernames. Is there a way to alias…
1
vote
1 answer

Apache authentication requirement based on location

I am trying to configure my apache server to have the following rule. If the request comes from 192.168.., no authentication is required. But from anywhere else, I want to require them to log in. So far I have the second part configured: Alias…
Churk
  • 121
  • 5
1
vote
2 answers

Control IIS website access to users with Active Directory

Basic authentication question. I have my website up and it is set up to be used by Windows Active Directory users. How can I control access to the website within AD users so that some have access and some don't? Is this something I can do from IIS…
ZVenue
1
vote
1 answer

Windows XP NTP client authentication

I'm trying to configure a Windows XP NTP client to authenticate to a local NTP server on our closed network. How can I make this happen? One article I've found for configuring the client to talk to a remote server is:…
Erik
  • 27
  • 7