Questions tagged [authentication]

A process of proving that an entity (commonly a user or organization) is who they claim to be, or who they were previously identified as being. Authentication does not guarantee that particular entity's identity absolutely, it just proves that they are the same agent that has previously successfully asserted their identity. There are three factors (types) of authentication, and a particular authentication process may combine two or more different factors.

Authentication is critical to systems security. It is the mechanism an authoritative system uses to validate a given entity's asserted identity (who they claim to be) is the same as that entity's stored credentials. Credentials must be previously stored for an entity either by the authoritative system, or by another trusted system, before authentication can occur.

Authentication is commonly used in real life in a number of different scenarios, for example a national border agent confirming a person's identity using a passport.

Authentication usually requires the entity being authenticated to produce one or more tokens. These tokens are then used, possibly alongside other properties or characteristics of the entity, to confirm their identity. An example of an authentication token is a password. These tokens can fall into three broad categories, or factors:

  • Something you know. This is the most commonly used authentication factor in electronic systems. It is most commonly implemented as a password or PIN (personal identification number). This is also the most commonly misused authentication factor. Many system require a secondary security question, such as your mother's maiden name, place you were born in or other such trivia. These all belong to this single factor, thus systems can as as many questions as they like and they are still single factor authentication; all the answers are something the entity would know.
  • Something you have. This is most commonly implemented as a formula number generator (like an RSA Key Fob) or a digital certificate (which can be stored on a smart card or less securely as a simple file on a computer). The Key Fobs, Smart Cards, and SSL Certificates are the most commonly used forms of this factor.
  • Something you are. This is commonly known as biometric security. Fingerprints and iris scans are the most common form when used with electronic access systems. Fingerprints and DNA are the most commonly used in law enforcement.

It should be noted that some security experts have reservations about the factor categories. Specifically all authentication factors are fed into the authentication mechanism as computerized information and are therefore subject to the same possible tampering or forgery as any other information. Digital Certificates for example are essentially passwords that are so long a normal person would never memorize it; it must be stored on a medium (thus termed "something you have"). Similarly anyone who has seen a spy movie has undoubtedly seen a fictional character copy a fingerprint or fake an iris scan. This is possible because the authentication mechanism is reliant on a digital reproduction of the physical item; a digital representation that can be duplicated.

There are many indirect authentication schemes as well. Kerberos is one of the most popular, you authenticate against a central store, which then gives you a token. The token can then be used to grant you access to other systems in lieu of the original authentication mechanism.

Authentication should not be confused with Authorization, which involves granting rights to a specific entity. Authorization schemes are commonly dependent on Authentication to ensure security, but are not the same.

See Wikipedia for more information about Authentication and Security.

2218 questions
1
vote
3 answers

Using a database to authenticate linux users

How can I use a database of some sort to contain a list of valid linux users that can be used to allow them to login to the system as well as FTP in? My situation is that I need allow new user logins to be create from a web based control panel. I…
Jack
  • 13
  • 2
1
vote
1 answer

LDAP for 8 machines and 4 users

I'm currently administering about 8 server machines running Ubuntu. Right now, the 4 people with authority to ssh to the systems all share the same private key. This was fine when it was two people and two machines but it's not a good solution…
Adam Nelson
  • 1,647
  • 3
  • 14
  • 12
1
vote
3 answers

restricting access via ssh

We have a data processing workstation that's shared by a number of users. I would like to set up a script on that machine to process my data and then copy it it back to my personal machine afterwards. I recently learned about ssh public key…
eykanal
  • 335
  • 1
  • 2
  • 13
1
vote
1 answer

DCOM Authentication Fails to use Kerberos, Falls back to NTLM

I have a webservice that is written in Classic ASP. In this web service it attempts to create a VirtualServer.Application object on another server via DCOM. This fails with Permission Denied. However I have another component instantiated in this…
Asa Yeamans
  • 11
  • 1
  • 3
1
vote
3 answers

SQL Server read-only user can connect local but not remotely

I have a SQL Server where admin users can connect locally and remotely, but read only users can only connect locally and get a "Login failed" error when connecting remotely. It's using SQL Server Authentication. Any ideas on what could be happening?
Jorge Guzman
  • 337
  • 2
  • 4
  • 14
1
vote
3 answers

When to trust a web application's security with HTTPS only rather than use a VPN?

We are installing a vendor-supplied ASP.net application on IIS 7.5, giving access to sensitive customer details for remote access by our staff. I am wondering whether it is necessary to use a VPN to secure it. Using a VPN would be considerably more…
Surreal
  • 285
  • 1
  • 3
  • 6
1
vote
1 answer

Exchange Server EWS authentication configuration

How common is it for people to enable Basic authentication with Exchange Web Services? I am looking to connect to Exchange Server from an app running on Windows Phone 7 which only supports Basic authentication. The default configuration of an…
Gavin
  • 11
  • 2
1
vote
3 answers

Rsync with windows accounts?

I am trying to rsync between two windows computers, without using ssh. IS there anything special I should do or will rsync be able to make use of windows accounts the same as unix accounts? Or do I need to do something special when it comes to…
Jay White
  • 149
  • 1
  • 2
  • 10
1
vote
3 answers

wget: download a website which is password protected using a form

I have a problem with downloading a website using wget. First I need to login to the website with a username and password: wget --save-cookies cookies.txt --post-data --cookies=on --keep-session-cookies …
Rama
  • 11
  • 1
  • 3
1
vote
1 answer

Apache Authentication w/ OS X User Accounts

Is it possible to configure Apache to use the host machine's user accounts for authentication? Say I've got Apache running on a vanilla OS X install and want to basically allow admin users to authenticate with their system username/password. Even…
Wilco
  • 365
  • 5
  • 17
1
vote
1 answer

Custom router/wi-fi access

I'm looking for a way to restrict wi-fi access to devices on our network. I've got an external server running on an outside network which should authenticate the user access to the network. What router solutions are available to setup such an…
Mattias
  • 285
  • 1
  • 2
  • 6
1
vote
1 answer

Squid %m parameter - what does it mean and how can I use it

I am trying to implement custom authenticator for Squid by having something like auth_param basic program my_authenticator.sh in the /etc/squid3/squid.conf file. It all works fine, but I want to make an improvement. The responsibility of…
mindas
  • 238
  • 2
  • 6
1
vote
2 answers

information about windows Basic Authentication

i've some questions about Basic Authentication in Windows Server 2008. I read that Basic Authentication send the passowrd as plain text, so it is insecure, but you can combinate it with SSL to improve security. In that case, what are differences…
Matteo
  • 81
  • 1
  • 9
1
vote
1 answer

Joining Samba to Active Directory with local user authentication

I apologise that this is somewhat incoherent, but hopefully someone will be able to make enough sense of this to understand what I'm trying to achieve and provide pointers. I have a machine with two network interfaces connected to two different…
1
vote
0 answers

Digest Authentication for IIS7 + SvnBridge

I'm trying to install SvnBridge on my TFS Server running Windows Server 2008 R2, TFS, and now SvnBridge in an IIS7 website. http://svnbridge.codeplex.com/ When I attempted to visit the project repository for example @…
jordan.baucke
  • 115
  • 1
  • 9