Questions tagged [authentication]

A process of proving that an entity (commonly a user or organization) is who they claim to be, or who they were previously identified as being. Authentication does not guarantee that particular entity's identity absolutely, it just proves that they are the same agent that has previously successfully asserted their identity. There are three factors (types) of authentication, and a particular authentication process may combine two or more different factors.

Authentication is critical to systems security. It is the mechanism an authoritative system uses to validate a given entity's asserted identity (who they claim to be) is the same as that entity's stored credentials. Credentials must be previously stored for an entity either by the authoritative system, or by another trusted system, before authentication can occur.

Authentication is commonly used in real life in a number of different scenarios, for example a national border agent confirming a person's identity using a passport.

Authentication usually requires the entity being authenticated to produce one or more tokens. These tokens are then used, possibly alongside other properties or characteristics of the entity, to confirm their identity. An example of an authentication token is a password. These tokens can fall into three broad categories, or factors:

  • Something you know. This is the most commonly used authentication factor in electronic systems. It is most commonly implemented as a password or PIN (personal identification number). This is also the most commonly misused authentication factor. Many system require a secondary security question, such as your mother's maiden name, place you were born in or other such trivia. These all belong to this single factor, thus systems can as as many questions as they like and they are still single factor authentication; all the answers are something the entity would know.
  • Something you have. This is most commonly implemented as a formula number generator (like an RSA Key Fob) or a digital certificate (which can be stored on a smart card or less securely as a simple file on a computer). The Key Fobs, Smart Cards, and SSL Certificates are the most commonly used forms of this factor.
  • Something you are. This is commonly known as biometric security. Fingerprints and iris scans are the most common form when used with electronic access systems. Fingerprints and DNA are the most commonly used in law enforcement.

It should be noted that some security experts have reservations about the factor categories. Specifically all authentication factors are fed into the authentication mechanism as computerized information and are therefore subject to the same possible tampering or forgery as any other information. Digital Certificates for example are essentially passwords that are so long a normal person would never memorize it; it must be stored on a medium (thus termed "something you have"). Similarly anyone who has seen a spy movie has undoubtedly seen a fictional character copy a fingerprint or fake an iris scan. This is possible because the authentication mechanism is reliant on a digital reproduction of the physical item; a digital representation that can be duplicated.

There are many indirect authentication schemes as well. Kerberos is one of the most popular, you authenticate against a central store, which then gives you a token. The token can then be used to grant you access to other systems in lieu of the original authentication mechanism.

Authentication should not be confused with Authorization, which involves granting rights to a specific entity. Authorization schemes are commonly dependent on Authentication to ensure security, but are not the same.

See Wikipedia for more information about Authentication and Security.

2218 questions
1
vote
2 answers

Postfix - Is there a way to reject invalid authentication (even for mynetworks)?

I got a working postfix/dovecot configuration running with the following rule for recipients rejection: smtpd_recipient_restrictions = permit_sasl_authenticated,permit_mynetworks,reject This works as intended (authorize authenticated users or users…
Julien
  • 78
  • 1
  • 8
1
vote
4 answers

Currently no logon servers available to service the logon request (VPN and file share)

I have a remote user with a laptop joined to our domain. He can successfully log onto the machine. While he is out of the office, he connects using SSL VPN, which connects and passes traffic. When he attempts to hit the fileshare on the network, he…
jeremy
  • 855
  • 4
  • 20
  • 31
1
vote
2 answers

basic http authentication

I am using apache's basic http authentication to control access, however, I only want to control one level of directory access, meaning, I only want directory a to be authenticated, but not a's children(eg. a/b), is this possible?
user881480
  • 149
  • 3
1
vote
1 answer

Can't log in using sa account for sql server 2008

I installed SQL Server 2008. During the install I set it to mixed mode authentication and set the password for what I assume is the sa account. In the configuration manager I set tcp/ip and named pipes to enabled. When I open SQL Server Management…
tessa
1
vote
1 answer

Qmail SMTP Whitelist & SMTP Authentication?

How can I get qmail to work with both an smtp whitelist and smtp authentication? If my IP is whitelisted, SMTP authentication does not seem to work (error: "the server does not support SMTP password authentication). This is particularly annoying…
ck86
  • 11
  • 2
1
vote
2 answers

Allowing non-admin users to unstick the print spooler

I currently have an issue where the print queue is getting stuck on a central print server (windows server 2008). Using the "Clear all documents" function does not clear it and gets stuck too. I need non-admin users to be able to clear the print…
Reafidy
  • 319
  • 1
  • 7
  • 18
1
vote
1 answer

403 error trying to access admin panel on Tomcat 7

I'm having trouble accessing my Tomcat admin panel. I've configured everything correctly as far as I can see (adding an admin/manager user to tomcat-users.xml). I can log into manager/html and enter my credentials, then get presented with a 403…
richzilla
  • 205
  • 1
  • 3
  • 13
1
vote
2 answers

apache basic auth require group not throing forbidden

i have a basic auth setuped with user and groups AuthType Basic AuthName "GSD Dev Area" AuthUserFile /coding/conf/passwords/gsdesign/htpasswd AuthGroupFile /coding/conf/passwords/gsdesign/groups Require valid-user and now i want to…
1
vote
4 answers

How to properly configure squid as transparent proxy with authentication

I set up iptables and squid successfully, now I try to get the proxy authentication running. My squi.conf look the following way: auth_param basic program /usr/lib/squid/ncsa_auth /etc/squid/proxy_users auth_param basic children 5 auth_param basic…
Kai
  • 177
  • 1
  • 3
  • 10
1
vote
1 answer

How to get Squid to allow access based on referral?

I have a very specific need of allowing access to an unknown set of domains where they all have a common domain as referral. Put the other way around I have a website including items (js, images, css, etc) from an unknown set of domains which I need…
mr-euro
  • 848
  • 3
  • 14
  • 31
1
vote
1 answer

Linux restrict a telnet and rs323 user to only run a few programs

I have an embeded linux video server that I just finished. One of the features is that I have a telnet server as well as getty bound to an rs232 port which a user can log into to call a few programs which I have written for server configuration…
Jonathan Henson
  • 979
  • 2
  • 10
  • 16
1
vote
1 answer

Restricted account for interrogating Active Directory by LDAP

Our phone system has the ability to load its phonebook via LDAP, but it only supports non-SSL. As a result, I am planning on setting up an account that only has access to read our Active Directory LDAP database, and preferably only the two or three…
Mark Henderson
  • 68,823
  • 31
  • 180
  • 259
1
vote
3 answers

Possible to enable ssh passwordless authentication via Windows Active Directory?

Is it possible to set up ssh and Active Directory (Win2008r2 flavour) such that domain-users can access *nix and ssh-servers-running-on-Windows-servers without needing to type their password? If so, how? I've found some documentation that suggests…
1
vote
3 answers

Keep getting login requests for ASP.NET app running in IIS 7.5

When I try to access an Intranet site from a client I get asked to login all the time. Then I get a 401.3 error. The site works fine locally on the server. The site has its own app pool, Managed Pipeline Mode is Integrated. I have set Read/Execute,…
empo
  • 119
  • 1
  • 2
1
vote
1 answer

Apache authenticate group of matching subdirectory

I have a unique scenario here - one that probably has come up in the past. I have a directory that is being protected by an LDAP authentication on my Apache server. In this directory (call it /svn - yes, it's a subversion directory), there are…
nuclearpenguin
  • 193
  • 3
  • 10