Questions tagged [authentication]

A process of proving that an entity (commonly a user or organization) is who they claim to be, or who they were previously identified as being. Authentication does not guarantee that particular entity's identity absolutely, it just proves that they are the same agent that has previously successfully asserted their identity. There are three factors (types) of authentication, and a particular authentication process may combine two or more different factors.

Authentication is critical to systems security. It is the mechanism an authoritative system uses to validate a given entity's asserted identity (who they claim to be) is the same as that entity's stored credentials. Credentials must be previously stored for an entity either by the authoritative system, or by another trusted system, before authentication can occur.

Authentication is commonly used in real life in a number of different scenarios, for example a national border agent confirming a person's identity using a passport.

Authentication usually requires the entity being authenticated to produce one or more tokens. These tokens are then used, possibly alongside other properties or characteristics of the entity, to confirm their identity. An example of an authentication token is a password. These tokens can fall into three broad categories, or factors:

  • Something you know. This is the most commonly used authentication factor in electronic systems. It is most commonly implemented as a password or PIN (personal identification number). This is also the most commonly misused authentication factor. Many system require a secondary security question, such as your mother's maiden name, place you were born in or other such trivia. These all belong to this single factor, thus systems can as as many questions as they like and they are still single factor authentication; all the answers are something the entity would know.
  • Something you have. This is most commonly implemented as a formula number generator (like an RSA Key Fob) or a digital certificate (which can be stored on a smart card or less securely as a simple file on a computer). The Key Fobs, Smart Cards, and SSL Certificates are the most commonly used forms of this factor.
  • Something you are. This is commonly known as biometric security. Fingerprints and iris scans are the most common form when used with electronic access systems. Fingerprints and DNA are the most commonly used in law enforcement.

It should be noted that some security experts have reservations about the factor categories. Specifically all authentication factors are fed into the authentication mechanism as computerized information and are therefore subject to the same possible tampering or forgery as any other information. Digital Certificates for example are essentially passwords that are so long a normal person would never memorize it; it must be stored on a medium (thus termed "something you have"). Similarly anyone who has seen a spy movie has undoubtedly seen a fictional character copy a fingerprint or fake an iris scan. This is possible because the authentication mechanism is reliant on a digital reproduction of the physical item; a digital representation that can be duplicated.

There are many indirect authentication schemes as well. Kerberos is one of the most popular, you authenticate against a central store, which then gives you a token. The token can then be used to grant you access to other systems in lieu of the original authentication mechanism.

Authentication should not be confused with Authorization, which involves granting rights to a specific entity. Authorization schemes are commonly dependent on Authentication to ensure security, but are not the same.

See Wikipedia for more information about Authentication and Security.

2218 questions
1
vote
2 answers

Developer Laptop with SQL Server 2008 can't login to SSIS when offsite

When I bring my Windows XP (SP3) laptop home I can still login as my domain account because Windows caches the info necessary to authenticate me when the domain controller isn't around. However, when I try to connect to the local SQL Server (2008)…
Wayne Bloss
  • 143
  • 1
  • 1
  • 5
1
vote
2 answers

Is it possible to integrate Computer Associates SiteMinder with SQLServer?

We have a MS SQL BI stack which the standards group wants us to move to "WebSSO" which is based on Computer Associates SiteMinder/netegrity product. I figure integrating the web component won't be too hard, but we have users which connect to the…
1
vote
2 answers

RADIUS authentication on Cisco switches: how to assign privilege levels?

I need to configure some Cisco switches (IOS 12.x) to authenticate against a RADIUS server; the server is Windows Server 2003's IAS, and it validates users against his Active Directory domain. I know how to configure the switches to validate…
Massimo
  • 70,200
  • 57
  • 200
  • 323
1
vote
2 answers

How to failover to local account on a cisco switch/router if radius server fails?

I have the following configuration on a switch that I testing for RADIUS authentication: aaa new-model aaa authenticaton login default group radius local aaa authentication enable default group radius enable aaa authorization exec default…
3D1L
  • 109
  • 3
  • 7
  • 13
1
vote
2 answers

Set-up SSHD to handle multiple key pairs

I am trying to set up my sshd to accept users that do not have a system user account. My approach is to use DSA public/private key pairs. I generated a key pair: $ ssh-keygen -t dsa I copied id_dsa.pub to the server machine where sshd runs. I…
Warlax
  • 33
  • 4
1
vote
1 answer

IIS reverse proxy to windows authenticated internal site

I have an internal windows authenticated website that I need to expose anonymously to external users. extern: http://foo.com/ (public) intern: http://privatefoo/ (requires windows auth) I want people hitting foo.com to see no security prompt, just…
keithwarren7
  • 186
  • 2
  • 8
1
vote
2 answers

Computer authenticating with incorrect DC...sort of

I have a login script that uses the LOGONSERVER environment variable. I have several remote offices. There is one file server/DC in each office and each office is their own site. So when a user logs in to an office they should authenticate with that…
Terry
1
vote
3 answers

"Unknown user name or bad password" when I launch ADUC

When I open up Active Directory Users and Computers from my workstation, I receive an error: Naming information cannot be located because: Logon failure: unknown user name or bad password. Contact your system administrator to verify that your…
Chris
  • 347
  • 3
  • 6
  • 13
1
vote
3 answers

Open NetApp CIFS Share

I have a CIFS share on a NetApp device. I want this share to be completely open to any user/computer on the same network. I don't want any authentication (domain, workgroup, etc) required; no login/password should need to be provided. Currently I…
kingfish
  • 410
  • 3
  • 11
1
vote
1 answer

IIS Application requires Forms Authentication for everything

At the moment, I'm trying to develop an ASP.NET MVC application using a local IIS server (Dev Server was just too slow). However, every page request, including CSS/JS results in a redirect to the login page. Anyone know what's going on?
jameszhao00
  • 111
  • 1
1
vote
2 answers

Authenticating with Exchange WebDAV / Outlook Web Access

I'm having issues accessing Exchange WebDav / OWA from any machine but the IIS & Exchange server. We've got a small development domain running Windows 2003. One server (which we'll call IIS_box) runs IIS and Exchange 2003. The IIS_Box has Outlook…
Grhm
  • 293
  • 5
  • 16
1
vote
0 answers

AuthorizedKeysCommand setup prompts for password

The issue: Even though I've set up AuthorizedKeysCommand and password authentication is stopped when I attempt to log in from my Mac, I am still being asked to enter the password: OS: Rocky Linux 9.2 OpenSSH version on the server: OpenSSH_8.7p1,…
zamunda68
  • 31
  • 3
1
vote
0 answers

curl only attempting public key auth for SFTP, not printing SSH authentication methods available

I am trying to use curl to connect to an SFTP server. The server only accepts password authentication. When I try to connect, curl only attempts public-key auth. $ curl --verbose --insecure…
sourcenouveau
  • 499
  • 1
  • 5
  • 18
1
vote
2 answers

How do I query user attributes from a Samba AD DC in Linux with Kerberos auth?

An answer exists for querying AD with password auth, which is working fine locally. What about Kerberos auth? Running ldapsearch with GSSAPI auth yields the following error: $ ldapsearch -ZZ -Y GSSAPI -H ldap://ad.server.fqdn/ -b…
cqcallaw
  • 163
  • 1
  • 8
1
vote
1 answer

FreeIPA authentication issues across high latency link?

We recently setup a FreeIPA server. We're using it for central user management, DNS, and CA. It's been working great with one exception. Some of the workstations that authenticate with this FreeIPA server are several thousands of miles away. …
dutsnekcirf
  • 249
  • 2
  • 4
  • 16