Questions tagged [authentication]

A process of proving that an entity (commonly a user or organization) is who they claim to be, or who they were previously identified as being. Authentication does not guarantee that particular entity's identity absolutely, it just proves that they are the same agent that has previously successfully asserted their identity. There are three factors (types) of authentication, and a particular authentication process may combine two or more different factors.

Authentication is critical to systems security. It is the mechanism an authoritative system uses to validate a given entity's asserted identity (who they claim to be) is the same as that entity's stored credentials. Credentials must be previously stored for an entity either by the authoritative system, or by another trusted system, before authentication can occur.

Authentication is commonly used in real life in a number of different scenarios, for example a national border agent confirming a person's identity using a passport.

Authentication usually requires the entity being authenticated to produce one or more tokens. These tokens are then used, possibly alongside other properties or characteristics of the entity, to confirm their identity. An example of an authentication token is a password. These tokens can fall into three broad categories, or factors:

  • Something you know. This is the most commonly used authentication factor in electronic systems. It is most commonly implemented as a password or PIN (personal identification number). This is also the most commonly misused authentication factor. Many system require a secondary security question, such as your mother's maiden name, place you were born in or other such trivia. These all belong to this single factor, thus systems can as as many questions as they like and they are still single factor authentication; all the answers are something the entity would know.
  • Something you have. This is most commonly implemented as a formula number generator (like an RSA Key Fob) or a digital certificate (which can be stored on a smart card or less securely as a simple file on a computer). The Key Fobs, Smart Cards, and SSL Certificates are the most commonly used forms of this factor.
  • Something you are. This is commonly known as biometric security. Fingerprints and iris scans are the most common form when used with electronic access systems. Fingerprints and DNA are the most commonly used in law enforcement.

It should be noted that some security experts have reservations about the factor categories. Specifically all authentication factors are fed into the authentication mechanism as computerized information and are therefore subject to the same possible tampering or forgery as any other information. Digital Certificates for example are essentially passwords that are so long a normal person would never memorize it; it must be stored on a medium (thus termed "something you have"). Similarly anyone who has seen a spy movie has undoubtedly seen a fictional character copy a fingerprint or fake an iris scan. This is possible because the authentication mechanism is reliant on a digital reproduction of the physical item; a digital representation that can be duplicated.

There are many indirect authentication schemes as well. Kerberos is one of the most popular, you authenticate against a central store, which then gives you a token. The token can then be used to grant you access to other systems in lieu of the original authentication mechanism.

Authentication should not be confused with Authorization, which involves granting rights to a specific entity. Authorization schemes are commonly dependent on Authentication to ensure security, but are not the same.

See Wikipedia for more information about Authentication and Security.

2218 questions
1
vote
0 answers

Combining IP access control with digest authentication in Apache

I want to restrict access to a given site based on two criteria: The IP address of the client (i.e. is it within an allowed range) and; Digest authentication. However, for each range of IPs there will be a different list of username/password…
pwaring
  • 209
  • 2
  • 7
1
vote
1 answer

Unrestricted access to a single file + FastCGI with basic_auth for whole domain in nginx

What's the easiest way to restrict access to all files except one, where whole domain is served via FastCGI? The problem occurring when below conf is used, is that I cannot access /dir (I'm asked for password in some kind of loop, correct…
piobyz
  • 123
  • 6
1
vote
1 answer

Requiring a password for every webapp under Tomcat

This guide shows how to configure a user/pass authentication for a specific webapp. How can I configure Tomcat to require a global user/pass for all the webapps?
ripper234
  • 5,890
  • 9
  • 41
  • 49
1
vote
1 answer

Exim4 SMTP Authentication to Courier

I've recently setup Exim4 on an Ubuntu 10.04 server with Courier. Everything is working fine for local mail deliver, the only missing piece is SMTP Authentication. I have an account setup on the server in Courier however whenever I try to send to…
Marco Ceppi
  • 457
  • 3
  • 19
1
vote
5 answers

computer authentication

I have a server and several clients (The technology is not important in the moment. It can be any.). I need to authenticate the computers. They are located in several offices geographically allocated with dynamic IP addresses. I do not trust the…
darko petreski
  • 289
  • 1
  • 2
  • 8
1
vote
2 answers

Requiring authentication for Internet access on an open network

If I have an open mesh wireless network (or, really, any open access network) and I want to keep the network open access: that is, anyone with the right hardware should be able to connect and talk to other computers on the network, but I want to…
singpolyma
  • 489
  • 2
  • 7
  • 19
1
vote
1 answer

FreeRADIUS Authentication Fails

I'm using an SQL database of accounts for FreeRADIUS to authenticate against. I'm managing these accounts using the default Dialup Admin interface. I have created a test user - testing123 and given it a password. However, I cannot successfully…
Joe
  • 344
  • 2
  • 7
  • 23
1
vote
1 answer

Can freeradius bypass authentication for one realm only?

I have a question similar to this one, but without the VLAN complications. How can(?) I configure FreeRadius 1.x to allow any combination of username/password for one realm only? If FreeRadius 1.x does not provide this ability, does the 2.x line do…
Joe
  • 1,775
  • 15
  • 23
1
vote
2 answers

Custom Web Form for Shibboleth login

I recently deployed a server and website that authenticates with my university's Shibboleth authentication system. Functionally, it works great. Aesthetically, there is much When you go to the login page, the login page is redirected to the…
1
vote
1 answer

Kerberos Authentication for Webservers

Before I blindly jump on "trial an error" tests, I'd like to ask some general questions on Kerberos Authentication for Webservers. I want to evaluate what's possible with Kerberos. The main benefit would, of course, be Single-Sign-On. But it might…
DonEstefan
  • 128
  • 2
  • 9
1
vote
4 answers

How to direct Apache Basic authentication over SSL?

Our intranet use mod_ldap to authenticate users to our internal Active Directory server as follows: AuthType Basic AuthName "***" AuthBasicProvider ldap AuthLDAPUrl "***" require valid-user We want…
Brent
  • 22,857
  • 19
  • 70
  • 102
1
vote
1 answer

Certificate Authentication Proxy with IIS

I have Server-A (IIS-6) performing certificate based authentication of users. If I want to put a reverse proxy (Server-B) in front of Server-A, what is the best method while still continuing to use certificate based authentication (if possible) on…
Loki
  • 111
  • 3
1
vote
4 answers

Apache basic authentication - auth not required for some files

I'm trying to allow unauthenticated access to certain scripts within a Nagios installation. Although the question is not specifically about Nagios nor the CGI handling that's also illustrated below. Essentially, I want to require authentication for…
symcbean
  • 21,009
  • 1
  • 31
  • 52
1
vote
1 answer

Changing LDAP password without using LdapAdmin

our former sysadmin went from fulltime to 'on demand' and left me with the "task" to administer part of the local network. One of my jobs is changing users' passwords (they can't do it themselves unless they are given the LDAP admin password, for…
lorenzog
  • 2,799
  • 3
  • 20
  • 24
1
vote
1 answer

Apache HTTP authentication fault

It's weird that I only need to type in the first 70% part of the password to be cleared for access. I used .htaccess and .htpasswd to set up the authentication. And it's more weird that when the password is actually abcabcabc123, I will be allowed…
datasn.io
  • 279
  • 1
  • 5
  • 16