Questions tagged [authentication]

A process of proving that an entity (commonly a user or organization) is who they claim to be, or who they were previously identified as being. Authentication does not guarantee that particular entity's identity absolutely, it just proves that they are the same agent that has previously successfully asserted their identity. There are three factors (types) of authentication, and a particular authentication process may combine two or more different factors.

Authentication is critical to systems security. It is the mechanism an authoritative system uses to validate a given entity's asserted identity (who they claim to be) is the same as that entity's stored credentials. Credentials must be previously stored for an entity either by the authoritative system, or by another trusted system, before authentication can occur.

Authentication is commonly used in real life in a number of different scenarios, for example a national border agent confirming a person's identity using a passport.

Authentication usually requires the entity being authenticated to produce one or more tokens. These tokens are then used, possibly alongside other properties or characteristics of the entity, to confirm their identity. An example of an authentication token is a password. These tokens can fall into three broad categories, or factors:

  • Something you know. This is the most commonly used authentication factor in electronic systems. It is most commonly implemented as a password or PIN (personal identification number). This is also the most commonly misused authentication factor. Many system require a secondary security question, such as your mother's maiden name, place you were born in or other such trivia. These all belong to this single factor, thus systems can as as many questions as they like and they are still single factor authentication; all the answers are something the entity would know.
  • Something you have. This is most commonly implemented as a formula number generator (like an RSA Key Fob) or a digital certificate (which can be stored on a smart card or less securely as a simple file on a computer). The Key Fobs, Smart Cards, and SSL Certificates are the most commonly used forms of this factor.
  • Something you are. This is commonly known as biometric security. Fingerprints and iris scans are the most common form when used with electronic access systems. Fingerprints and DNA are the most commonly used in law enforcement.

It should be noted that some security experts have reservations about the factor categories. Specifically all authentication factors are fed into the authentication mechanism as computerized information and are therefore subject to the same possible tampering or forgery as any other information. Digital Certificates for example are essentially passwords that are so long a normal person would never memorize it; it must be stored on a medium (thus termed "something you have"). Similarly anyone who has seen a spy movie has undoubtedly seen a fictional character copy a fingerprint or fake an iris scan. This is possible because the authentication mechanism is reliant on a digital reproduction of the physical item; a digital representation that can be duplicated.

There are many indirect authentication schemes as well. Kerberos is one of the most popular, you authenticate against a central store, which then gives you a token. The token can then be used to grant you access to other systems in lieu of the original authentication mechanism.

Authentication should not be confused with Authorization, which involves granting rights to a specific entity. Authorization schemes are commonly dependent on Authentication to ensure security, but are not the same.

See Wikipedia for more information about Authentication and Security.

2218 questions
1
vote
1 answer

Configure Apache to forward requests to proxy with NTLM2 authentication

I'm trying to call a REST API over the internet using SoapUI but I'm behind a corporate firewall that uses NTLM2 authentication which is not supported by SoapUI. Is it possible to run a local Apache or ISS instance to forward the request and add the…
Fergal
  • 143
  • 1
  • 1
  • 5
1
vote
1 answer

How can I determine which users are authenticating via ftp or telnet?

I've inherited a system that has both telnet and ftp enabled. As both these send passwords in cleartext I want to disable them. But many users have never changed their ways to use sftp or ssh. And before I make the change I need to contact them.…
Gray Race
  • 853
  • 3
  • 11
  • 22
1
vote
2 answers

Changed windows pwd; Can't connect to local sql anymore?

Yesterday I had to change my windows logon password. Today, when I try to connect to my local instance of Sql Server 2008 R2 through Management Studio, it gives me an error message. After reading this (…
rlb.usa
  • 163
  • 10
1
vote
1 answer

IIS Forms Authentication (php, asp.net server side login)

We have multiple applications running on a single "site". For example: www.site.com/ www.site.com/app1 www.site.com/app2 etc... Of these sites, some run PHP and some run ASP.net. We've got Windows Authentication running and working now for all the…
1
vote
1 answer

Unable to Login to kadmin from Kerberos Client

I have a small problem of getting my client to authenticate to a kerberos server that I just setup. Whenever I run: [root@localhost log]# kadmin -r KERBEROS.MONZELL.COM -p host/kerberos.monzell.com Authenticating as principal…
Rilindo
  • 5,078
  • 5
  • 28
  • 46
1
vote
1 answer

How to secure an IIS Site (HTML One) to be available only within a specific domain?

I'm wondering if there is a way to secure an IIS site (Static HTML Pages) to be available only within a specific domain (i.e. user should submit his domain user name and password to browse the site)? P.S. I'm using IIS7
Ahmed Atia
  • 113
  • 3
1
vote
1 answer

SSH in script without user interaction

Possible Duplicate: How to automate SSH login with password? Is there a way to call ssh in a bash script and automatically feed it the password for the account? e.g if i type ssh owen@myserver.com /settings it prompts me for a password. I want…
Owen
  • 13
  • 3
1
vote
1 answer

Wireless 802.1X Pre Logon connection

I am trialing 802.1x on 20 dell notebooks. I can get 8021x authentication to work however the user has to be logged onto the domain previously for it to work. If a new user logs in they get domain is unavailable. I am using Windows 2003 server…
JohnyV
  • 938
  • 4
  • 26
  • 45
1
vote
1 answer

MongoDB: Fixing ReplicaSet Error on reconfig - "Server::doWork task:rs Manager exception:unauthorized db:local lock type:2 client"

Question: How do I fix my servers and get them back to the normal ReplicaSet with no error messages? I'd offer a serious bounty, but all my points are on SO :( Details of the Problem I'm running a 3-node MongoDB ReplicaSet (1 master, 1 slave, 1…
Corey Ballou
  • 168
  • 1
  • 7
1
vote
2 answers

svn authentication fails for everyone except wildcard-user

I have been using svn for past few months (with default authentication rules) and only recently decided I wanted to add a bit more control over the repository authentication. I have been looking through this book…
1
vote
6 answers

Can a single user have multiple credential sets using MS Active Directory

We are currently transitioning our existing database based authentication to Active Directory. In the existing implementation, passwords are kept in clear-text in the database (I know this is bad, this is why we are transitioning). When a user…
oneself
  • 397
  • 1
  • 5
  • 15
1
vote
1 answer

How can I setup the Trac Repository authentication

I'm controlling the user authentication to the repository through apache. So my dav_svn.conf is the following: AuthType Basic AuthName "Subversion Repository" AuthUserFile /etc/apache2/dav_svn.passwd AuthzSVNAccessFile…
Mokus
  • 412
  • 1
  • 11
  • 20
1
vote
2 answers

Configure Squid to use authentication, but not require it

I'm setting squid up with squidGuard to act as a content filter. I'd like to configure squid so that by default users' web traffic flows through squidGuard. E.g. users browsing on a desktop, or a laptop roaming around on our wireless. If the user…
Keith Twombley
  • 235
  • 2
  • 11
1
vote
2 answers

How to expose just part of a Website to the WWW in IIS 7?

I have a website, apps.myWebsite.com, hosted in IIS 7.5 on a Windows Server 2008 R2. I have several application running on apps.myWebsite.com each of them with its own authentication policy. apps.myWebsite.com was not accessible from the WWW but…
CiccioMiami
  • 209
  • 1
  • 3
  • 14
1
vote
1 answer

LDAP authenticating partially. Password being replaced

After a week of struggling to find out why some of our machines are Authenticating off of our LDAP servers and some are not I noticed that after PAM binds to see if the uid exists it then sends the users password. At the packet level, I can see that…
josh