Questions tagged [authentication]

A process of proving that an entity (commonly a user or organization) is who they claim to be, or who they were previously identified as being. Authentication does not guarantee that particular entity's identity absolutely, it just proves that they are the same agent that has previously successfully asserted their identity. There are three factors (types) of authentication, and a particular authentication process may combine two or more different factors.

Authentication is critical to systems security. It is the mechanism an authoritative system uses to validate a given entity's asserted identity (who they claim to be) is the same as that entity's stored credentials. Credentials must be previously stored for an entity either by the authoritative system, or by another trusted system, before authentication can occur.

Authentication is commonly used in real life in a number of different scenarios, for example a national border agent confirming a person's identity using a passport.

Authentication usually requires the entity being authenticated to produce one or more tokens. These tokens are then used, possibly alongside other properties or characteristics of the entity, to confirm their identity. An example of an authentication token is a password. These tokens can fall into three broad categories, or factors:

  • Something you know. This is the most commonly used authentication factor in electronic systems. It is most commonly implemented as a password or PIN (personal identification number). This is also the most commonly misused authentication factor. Many system require a secondary security question, such as your mother's maiden name, place you were born in or other such trivia. These all belong to this single factor, thus systems can as as many questions as they like and they are still single factor authentication; all the answers are something the entity would know.
  • Something you have. This is most commonly implemented as a formula number generator (like an RSA Key Fob) or a digital certificate (which can be stored on a smart card or less securely as a simple file on a computer). The Key Fobs, Smart Cards, and SSL Certificates are the most commonly used forms of this factor.
  • Something you are. This is commonly known as biometric security. Fingerprints and iris scans are the most common form when used with electronic access systems. Fingerprints and DNA are the most commonly used in law enforcement.

It should be noted that some security experts have reservations about the factor categories. Specifically all authentication factors are fed into the authentication mechanism as computerized information and are therefore subject to the same possible tampering or forgery as any other information. Digital Certificates for example are essentially passwords that are so long a normal person would never memorize it; it must be stored on a medium (thus termed "something you have"). Similarly anyone who has seen a spy movie has undoubtedly seen a fictional character copy a fingerprint or fake an iris scan. This is possible because the authentication mechanism is reliant on a digital reproduction of the physical item; a digital representation that can be duplicated.

There are many indirect authentication schemes as well. Kerberos is one of the most popular, you authenticate against a central store, which then gives you a token. The token can then be used to grant you access to other systems in lieu of the original authentication mechanism.

Authentication should not be confused with Authorization, which involves granting rights to a specific entity. Authorization schemes are commonly dependent on Authentication to ensure security, but are not the same.

See Wikipedia for more information about Authentication and Security.

2218 questions
1
vote
2 answers

Outlook trying to connect to remote.mydomain.com

I have set up a new SBS 2008 server (including Exchange 2007). The clients are running Outlook 2007. All clients have an issue where Outlook periodically prompts for login to access remote.mydomain.com. When correct credentials are entered, the…
1
vote
0 answers

Setting up SQUID PROXY NCSA authentication on a windows machine

I have Squid Proxy installed on a windows machine. I want the users to authenticate themeselves when ever they access the net, i.e: An html page is displayed prompting for a username and password before continuing. From my research I have found…
user33121
  • 141
  • 2
  • 8
1
vote
2 answers

Get Safari to use different autocompletion on different URLs on same hostname

I have a webserver publishing different services over the same SSL VirtualHost, the two most commonly used being PhpMyAdmin and Cacti. These (and others) use 'cookie' style authentication, asking user and password in an HTML form (thus not using…
Luke404
  • 5,826
  • 4
  • 47
  • 58
1
vote
1 answer

Network update solutions for a company of ~20 (5 local, 15 remote)?

This is probably going to be a bit up in the air, because we're still in the "reaching towards solutions" phase, but I figured I'd see what you guys had to say. Plus I honestly know very little about systems and what is good and bad pratice. My…
Margaret
  • 231
  • 1
  • 7
  • 18
1
vote
1 answer

Modem with support for wired 802.1x

I'm looking at allowing internet access for only a few scattered users on a school network. One method I'm considering is using 802.1x authentication for the modem. Of course there are simpler options like only allowing specific IP or mac addresses,…
menko
  • 150
  • 2
  • 7
1
vote
2 answers

Using both domain users and local users for Squid authentication?

I'm working on a Squid proxy which needs to authenticate users against an Active Directory domain; this works fine, Samba was correctly set up and Squid authenticates users via ntlm_auth. Relevant lines in squid.conf: auth_param ntlm program…
Massimo
  • 70,200
  • 57
  • 200
  • 323
1
vote
1 answer

Adding users to Sharepoint when they are not in the same domain

Bear with me as I explain this, I'm working my way through Sharepoint access as I go, but I'll clarify my question as I go along. The Problem We have about 10,000 users who need access to our Sharepoint 2005 based reporting. Because our organization…
jim-work
1
vote
1 answer

Accessing resources on localhost using domain credentials

I'm trying to set up Team Foundation Server 2010, Sharepoint Server 2010 and Report Server 2008R2. I apologize for how long my question/problem is but I'm really lost on where to even look so am being as descriptive as possible in hopes that I'm…
1
vote
1 answer

Login error in phpMyAdmin, problem setting auth_type in config.inc.php

I'm having a problem accessing phpMyAdmin. A few weeks ago I did succeed configuring it for auth_type = 'cookie', but I still receive an error stating that I should have to set blowfish_secret. That was strange because it was set. So I changed…
sergiom
  • 113
  • 1
  • 1
  • 5
1
vote
3 answers

Picking up a lot of failed authentications for various accounts

My server is getting a lot of various failed authentication attempts for various accounts. The most common one (that I've seen ) or the root account. I have since enabled Fail2Ban and ran several rootkit / malware checks to ensure I wasn't…
Josh K
  • 454
  • 1
  • 6
  • 18
1
vote
1 answer

Single sign-on for SharePoint to MySite?

I've got a fairly simple SharePoint 2010 farm set up: 2 WFE servers with Network Load Balancing hosting the main portal site. As per Microsoft's best practice recommendations I've set up My Sites in a separate web application. As some of the…
Chris W
  • 2,670
  • 1
  • 23
  • 32
1
vote
2 answers

Windows Server 2003 - passwordless access to \\myhost\ but not \\myhost.mydomain.net\

I have a Windows Server 2003 system on which passwordless access to local UNC paths is possible using the server's unqualified hostname or its IP address, but not via its FQDN -- even when the hosts file is used to map that FQDN directly to…
1
vote
2 answers

IIS: redirect to a webpage if authentication fails

We have an IIS site (MOSS 2007) that uses Windows Authentication. When a user that has forgotten their password tries to login the servers keeps sending 401 requests. This means on IE the user gets three prompts before IE displays a blank page, on…
DrStalker
  • 6,946
  • 24
  • 79
  • 107
1
vote
3 answers

Active Directory to authenticate with an other A.D

I want to deploy an Active Directory. There are some users of an other A.D. domain that should get access to the computers that will be part of my own A.D. domain. Can I configure this? Thanks,
user28362
  • 556
  • 3
  • 7
  • 21
1
vote
3 answers

Old network login passed to IIS

Let me start by saying that I am not a server guy - I am a developer. But I develop and manage an ASP.NET application that uses Windows authentication. I've run into the problem I am about to describe before, and I would just like to understand how…
300 baud
  • 111
  • 1