Questions tagged [authentication]

A process of proving that an entity (commonly a user or organization) is who they claim to be, or who they were previously identified as being. Authentication does not guarantee that particular entity's identity absolutely, it just proves that they are the same agent that has previously successfully asserted their identity. There are three factors (types) of authentication, and a particular authentication process may combine two or more different factors.

Authentication is critical to systems security. It is the mechanism an authoritative system uses to validate a given entity's asserted identity (who they claim to be) is the same as that entity's stored credentials. Credentials must be previously stored for an entity either by the authoritative system, or by another trusted system, before authentication can occur.

Authentication is commonly used in real life in a number of different scenarios, for example a national border agent confirming a person's identity using a passport.

Authentication usually requires the entity being authenticated to produce one or more tokens. These tokens are then used, possibly alongside other properties or characteristics of the entity, to confirm their identity. An example of an authentication token is a password. These tokens can fall into three broad categories, or factors:

  • Something you know. This is the most commonly used authentication factor in electronic systems. It is most commonly implemented as a password or PIN (personal identification number). This is also the most commonly misused authentication factor. Many system require a secondary security question, such as your mother's maiden name, place you were born in or other such trivia. These all belong to this single factor, thus systems can as as many questions as they like and they are still single factor authentication; all the answers are something the entity would know.
  • Something you have. This is most commonly implemented as a formula number generator (like an RSA Key Fob) or a digital certificate (which can be stored on a smart card or less securely as a simple file on a computer). The Key Fobs, Smart Cards, and SSL Certificates are the most commonly used forms of this factor.
  • Something you are. This is commonly known as biometric security. Fingerprints and iris scans are the most common form when used with electronic access systems. Fingerprints and DNA are the most commonly used in law enforcement.

It should be noted that some security experts have reservations about the factor categories. Specifically all authentication factors are fed into the authentication mechanism as computerized information and are therefore subject to the same possible tampering or forgery as any other information. Digital Certificates for example are essentially passwords that are so long a normal person would never memorize it; it must be stored on a medium (thus termed "something you have"). Similarly anyone who has seen a spy movie has undoubtedly seen a fictional character copy a fingerprint or fake an iris scan. This is possible because the authentication mechanism is reliant on a digital reproduction of the physical item; a digital representation that can be duplicated.

There are many indirect authentication schemes as well. Kerberos is one of the most popular, you authenticate against a central store, which then gives you a token. The token can then be used to grant you access to other systems in lieu of the original authentication mechanism.

Authentication should not be confused with Authorization, which involves granting rights to a specific entity. Authorization schemes are commonly dependent on Authentication to ensure security, but are not the same.

See Wikipedia for more information about Authentication and Security.

2218 questions
8
votes
3 answers

openssl client authentication error: tlsv1 alert unknown ca: ... SSL alert number 48

I've generated a certificate using openssl and place it on the client's machine, but when I try to connect to my server using that certificate, I error mentioned in the subject line back from my server. Here's what I've done. 1) I do a test…
JoJoeDad
  • 231
  • 1
  • 2
  • 4
8
votes
1 answer

Authenticate Linux sshd with TACACS+ (Cisco ACS)

Our network engineering team uses multiple linux servers for syslog collection, configuration backups, tftp, etc... We want to use TACACS+ on a Cisco ACS machine as our central authentication server where we can change passwords and account for user…
Mike Pennington
  • 8,305
  • 9
  • 44
  • 87
8
votes
3 answers

How to create a Linux user without a password but being able to set it?

I have a username and an SSH key for a (hypothetical) guy and I need to give him admin access to a Linux (Ubuntu) server. I want him to be able to log in via SSH and then set his password by himself over a secure connection, instead of passing the…
Leonid Shevtsov
  • 551
  • 1
  • 5
  • 8
8
votes
2 answers

Configuring client certificate authentication in apache

I am trying to set up part of a Virtualhost in apache to require client authentication. The VirtualHost in question also acts as a reverse proxy for the actual web server. Here's what I have done: Created ca.crt, ca.csr, and ca.key on the server I…
8
votes
3 answers

Purpose of the x509 certificate in metadata files on the IdP side (SSO structure)

In order to implement SSO, I have been working with some IdP and a Shibboleth SP install without being able to answer this question. On the IdP side I have a few metadata files that describes some applications. Those files can contain a certificate,…
8
votes
3 answers

Join ActiveDirectory (Win 2k8R2) to OpenDirectory(Snow Leopard)

The vast majority of questions and so on regarding the interoperability of Active and Open directories involves getting Mac clients to see an AD and auth against it. What we'd like to do is get a Windows 7 workstation to auth completely against Open…
Tom O'Connor
  • 27,480
  • 10
  • 73
  • 148
8
votes
4 answers

How can I add myself to my local sql server's windows authentication?

IT recently re-setup my laptop with 64bit windows. He installed Sql Server dev edition for me and set it up with a username and password. I logged in and tried changing Sql Server to windows authentication, restarted sql server, and now it won't…
KallDrexx
  • 306
  • 1
  • 3
  • 12
8
votes
4 answers

Can I set up a different method of authentication on Nagios?

Nagios is a wonderful too for monitoring servers. Their web interface is not bad, either. However I am not crazy about using the HTTP Authentication that comes standard. Is there a way to use another method of authentication? (and I don't mean…
cwd
  • 2,763
  • 9
  • 33
  • 48
8
votes
3 answers

Can Windows integrate with LDAP?

Given an existing LDAP server used for authentication, can Windows desktops authenticate users against LDAP or perhaps Kerberos?
jldugger
  • 14,342
  • 20
  • 77
  • 129
8
votes
5 answers

Postfix "SASL authentication failure: No worthy mechs found"

Trying to use postfix with smtp to connect to google's smtp. When trying to send mail, I get this error: Sep 15 14:04:41 zedsaid postfix/smtp[20271]: certificate verification failed for smtp.gmail.com[74.125.95.109]:587: untrusted issuer…
Zed Said
  • 717
  • 6
  • 14
  • 25
8
votes
1 answer

Authenticating Apache HTTPd against multiple LDAP servers with expired accounts

We're using mod_authnz_ldap and mod_authn_alias in Apache 2.2.9 (as shipped in Debian 5.0, 2.2.9-10+lenny7) to authenticate against multiple Active Directory domains for hosting a Subversion repository. Our current configuration is: # Turn up…
8
votes
1 answer

IIS7 Windows Authentication Providers

Does anyone know what the different windows authentication providers for IIS7 means. There are 3 available providers NTLM Negotiate Negotiate:Kerberos NTLM is pretty obvious I think its NTLM and Negotiate is that Kerberos if so then what is…
Satish
  • 227
  • 3
  • 4
  • 9
7
votes
4 answers

How to find out which key was used for public key authentication?

Several developers using a shared account on a test server, using public key authentication. Is there any way to find out which key was used for authentication (e.g. the keys comment)?
Gyongyeee
  • 73
  • 4
7
votes
2 answers

Unable to login(ssh) with public private key pair

I am unable to login with public private key pairs. I do have access with a password. Following are the logs on server side and on the client side. Why am I unable to login? type=CRYPTO_KEY_USER msg=audit(1481731455.027:102046): user pid=8859 uid=0…
raju
  • 267
  • 2
  • 3
  • 9
7
votes
3 answers

Does a CA require a full-time administrator?

At my place of employment, we have skated by over the years without having an internal Certificate Authority. This has worked for us because there was no visible impact by not having trusted entities. However, It seems now that this trend has…
James Jones
  • 551
  • 2
  • 7
  • 15