Questions tagged [authentication]

A process of proving that an entity (commonly a user or organization) is who they claim to be, or who they were previously identified as being. Authentication does not guarantee that particular entity's identity absolutely, it just proves that they are the same agent that has previously successfully asserted their identity. There are three factors (types) of authentication, and a particular authentication process may combine two or more different factors.

Authentication is critical to systems security. It is the mechanism an authoritative system uses to validate a given entity's asserted identity (who they claim to be) is the same as that entity's stored credentials. Credentials must be previously stored for an entity either by the authoritative system, or by another trusted system, before authentication can occur.

Authentication is commonly used in real life in a number of different scenarios, for example a national border agent confirming a person's identity using a passport.

Authentication usually requires the entity being authenticated to produce one or more tokens. These tokens are then used, possibly alongside other properties or characteristics of the entity, to confirm their identity. An example of an authentication token is a password. These tokens can fall into three broad categories, or factors:

  • Something you know. This is the most commonly used authentication factor in electronic systems. It is most commonly implemented as a password or PIN (personal identification number). This is also the most commonly misused authentication factor. Many system require a secondary security question, such as your mother's maiden name, place you were born in or other such trivia. These all belong to this single factor, thus systems can as as many questions as they like and they are still single factor authentication; all the answers are something the entity would know.
  • Something you have. This is most commonly implemented as a formula number generator (like an RSA Key Fob) or a digital certificate (which can be stored on a smart card or less securely as a simple file on a computer). The Key Fobs, Smart Cards, and SSL Certificates are the most commonly used forms of this factor.
  • Something you are. This is commonly known as biometric security. Fingerprints and iris scans are the most common form when used with electronic access systems. Fingerprints and DNA are the most commonly used in law enforcement.

It should be noted that some security experts have reservations about the factor categories. Specifically all authentication factors are fed into the authentication mechanism as computerized information and are therefore subject to the same possible tampering or forgery as any other information. Digital Certificates for example are essentially passwords that are so long a normal person would never memorize it; it must be stored on a medium (thus termed "something you have"). Similarly anyone who has seen a spy movie has undoubtedly seen a fictional character copy a fingerprint or fake an iris scan. This is possible because the authentication mechanism is reliant on a digital reproduction of the physical item; a digital representation that can be duplicated.

There are many indirect authentication schemes as well. Kerberos is one of the most popular, you authenticate against a central store, which then gives you a token. The token can then be used to grant you access to other systems in lieu of the original authentication mechanism.

Authentication should not be confused with Authorization, which involves granting rights to a specific entity. Authorization schemes are commonly dependent on Authentication to ensure security, but are not the same.

See Wikipedia for more information about Authentication and Security.

2218 questions
1
vote
4 answers

Allowing LDAP users to change password

How to allow LDAP users to change password from client machines ?
nitins
  • 2,579
  • 15
  • 44
  • 68
1
vote
1 answer

How can we encrypt authentication against a Windows domain between Apache-on-Linux and client machines running Windows and OS X?

Setup: We have a machine (SRV1) serving Subversion via Apache to client machines running Windows 7 (CLI1), OS X (CLI2), and presumably some other clients running Windows XP (CLI3). While the material we are serving is not high security, the…
MetaHyperBolic
  • 115
  • 1
  • 6
1
vote
1 answer

ODBC DSN Authentication Options

I was wondering if besides the standard username/password ODBC authentication, other options exist to authenticate an ODBC connection using an alternate method like PKI similar to SSH. Seems like a username / password not as secure if all I want is…
noel_g
  • 41
  • 3
1
vote
2 answers

Kerberos authentication in IIS with .NET app under domain identity not working

Having a hell of a time trying to get a .NET web app to use Kerberos auth successfully, and would appreciate some assistance from the SF community. Currently there is a Win2003/IIS6 server hosting a web site out of the default "network service"…
user44172
1
vote
1 answer

Debugging Authentication attempts against Active Directory

I have various services configured to authenticate against Active Directory. It would be very helpful if they all logged authentication failures, but they don't. This makes debugging even a simple "incorrect password" error very frustrating. Is it…
Matt Simmons
  • 20,396
  • 10
  • 68
  • 116
1
vote
4 answers

ssh via public key authentication for users administered with NIS

I'm experimenting with using NIS for centralizing the user management for a network of approx 20 servers. I've got an NIS client and server working, and can ssh to the client machine and successfully log in, but only using a password. I'd like to be…
Paul Dixon
  • 1,516
  • 3
  • 23
  • 37
1
vote
3 answers

Add user in CentOS 5

I created a new user in my CentOS web server with useradd. Added a password with passwd. But I can't log in with the user via SSH. I keep getting 'access denied'. I checked to make sure that the password was assigned and that the account is…
Ron
  • 157
  • 1
  • 9
1
vote
1 answer

Creating a password protected Cydia repository?

The title pretty much sums it all. I'm evaluating using Cydia to distribute iPod/iPad/iPhone apps to a restricted set of users. I got a hang on how to setup a repository, but cannot figure whether it is possible to lock it or not. Even a simple…
1
vote
2 answers

Ubuntu 10.04: Restrict LDAP Access by Group (OpenDirectory on Mac OS X Server)

In a nutshell, I want to authenticate users of a Ubuntu 10.04 Server against a Mac OS X Server's OpenDirectory LDAP but ONLY allow them access if they are a member of a group on the LDAP side. Using some guides and previous experience, I am able to…
1
vote
2 answers

How can I tell Apache to force client authentication but to authorized based on a listed of trusted certificates rather than a CA?

I am trying to create an Apache SSL server to be used in pre-production testing and that even in production would be accessed by less than 5 or so users. Because of the small user base, I felt that the easiest way to manage certificates would just…
themaestro
  • 125
  • 5
1
vote
5 answers

Samba authentication problem when attempting to connect from Windows client

I've got a Linux server running Ubuntu and Samba. I've created two shares in Samba that point to directories that are owned by the user "cameron". When I attempt to connect to these shares on Windows 7 is connects and allows me to see the files but…
Camsoft
  • 961
  • 4
  • 12
  • 21
1
vote
2 answers

LDAP pass-through authentication

I have the following situation: I have a web site that needs to authenticate users, some of these will be internal users that are stored in an active directory domain, but there will be other users (ie customers and contractors) that I do not want…
gbjbaanb
  • 3,892
  • 1
  • 23
  • 27
1
vote
3 answers

phpMyAdmin: #1045 - Access denied for user 'root'@'localhost' (using password: YES).

I am getting in phpMyAdmin the famous #1045 error: Access denied for user 'root'@'localhost' (using password: YES). This is my /etc/phpmyadmin/config.inc.php: /** * Server(s) configuration */ $i = 0; // The $cfg['Servers'] array starts with…
tirenweb
  • 203
  • 1
  • 3
  • 11
1
vote
1 answer

ASP.NET Website Administration Tool: Unable to connect to SQL Server database

I am trying to get authentication and authorization working with my ASP MVC project. I've run the aspnet_regsql.exe tool without any problem and see the aspnetdb database on my server (using the Management Studio tool). my connection string in my…
1
vote
2 answers

IIS, DNS, Authentication

Not really sure what's going on so I'm going to just list my setup then my symptoms. We are running IIS 6.0 on Server 2003 on 2 identical servers. We run multiple websites on each server (Same sites). They are load balanced equally. Servers; …
Mike Mengell
  • 111
  • 2