Questions tagged [authentication]

A process of proving that an entity (commonly a user or organization) is who they claim to be, or who they were previously identified as being. Authentication does not guarantee that particular entity's identity absolutely, it just proves that they are the same agent that has previously successfully asserted their identity. There are three factors (types) of authentication, and a particular authentication process may combine two or more different factors.

Authentication is critical to systems security. It is the mechanism an authoritative system uses to validate a given entity's asserted identity (who they claim to be) is the same as that entity's stored credentials. Credentials must be previously stored for an entity either by the authoritative system, or by another trusted system, before authentication can occur.

Authentication is commonly used in real life in a number of different scenarios, for example a national border agent confirming a person's identity using a passport.

Authentication usually requires the entity being authenticated to produce one or more tokens. These tokens are then used, possibly alongside other properties or characteristics of the entity, to confirm their identity. An example of an authentication token is a password. These tokens can fall into three broad categories, or factors:

  • Something you know. This is the most commonly used authentication factor in electronic systems. It is most commonly implemented as a password or PIN (personal identification number). This is also the most commonly misused authentication factor. Many system require a secondary security question, such as your mother's maiden name, place you were born in or other such trivia. These all belong to this single factor, thus systems can as as many questions as they like and they are still single factor authentication; all the answers are something the entity would know.
  • Something you have. This is most commonly implemented as a formula number generator (like an RSA Key Fob) or a digital certificate (which can be stored on a smart card or less securely as a simple file on a computer). The Key Fobs, Smart Cards, and SSL Certificates are the most commonly used forms of this factor.
  • Something you are. This is commonly known as biometric security. Fingerprints and iris scans are the most common form when used with electronic access systems. Fingerprints and DNA are the most commonly used in law enforcement.

It should be noted that some security experts have reservations about the factor categories. Specifically all authentication factors are fed into the authentication mechanism as computerized information and are therefore subject to the same possible tampering or forgery as any other information. Digital Certificates for example are essentially passwords that are so long a normal person would never memorize it; it must be stored on a medium (thus termed "something you have"). Similarly anyone who has seen a spy movie has undoubtedly seen a fictional character copy a fingerprint or fake an iris scan. This is possible because the authentication mechanism is reliant on a digital reproduction of the physical item; a digital representation that can be duplicated.

There are many indirect authentication schemes as well. Kerberos is one of the most popular, you authenticate against a central store, which then gives you a token. The token can then be used to grant you access to other systems in lieu of the original authentication mechanism.

Authentication should not be confused with Authorization, which involves granting rights to a specific entity. Authorization schemes are commonly dependent on Authentication to ensure security, but are not the same.

See Wikipedia for more information about Authentication and Security.

2218 questions
1
vote
1 answer

Encryption type requested is not supported by the KDC

I am having intermittent issues with RDP'ing from a Windows 11 Enterprise PC to another Windows 11 Enterpise PC. Both PC's are domain joined and on the same subnet. Both PC's have a GPO applied to enforce: Require use of specific security layer for…
Riguez
  • 123
  • 1
  • 4
1
vote
1 answer

TLS 1.2 client ignoring "Acceptable CA" list for Apache ClientCertificateRequest

I have TLS 1.2 mutual authentication working on Apache 2.4.54 with a self-signed CA and test clients on iOS and MacOS. Everything works, except the clients do not recognize the "Acceptable client certificate CA" on the CertificateRequest, so…
user1055568
  • 131
  • 2
1
vote
0 answers

Setup Authentication for landingpage fetching data from proxy via access restriction?

Imagine the scenario where you have a client who wants you to implement calls to an external API on a landingpage that you've setup for them. The external API works based on a contract and API keys which are obtained through that contract; hence you…
DevelJoe
  • 187
  • 3
  • 11
1
vote
1 answer

SSH will always authenticate as root

# ssh -l admin 10.1.0.2 Warning: Permanently added '10.1.0.2' (RSA) to the list of known hosts. root@10.1.0.2's password: Using "OpenSSH_8.4p1 Debian-5+deb11u1, OpenSSL 1.1.1n" I want to connect to a remote host, but what ever I try, it always…
cybin
  • 21
  • 4
1
vote
0 answers

PAM "remember me" with timeout option for 2FA?

Is it possible for PAM to remember that a second factor authentication has passed for a short period of time, e.g. an hour? This would have to be keyed to a user and IP address. For example: Log in as tom from 1.2.3.4, password, 2FA, logged in. Log…
gak
  • 743
  • 1
  • 9
  • 23
1
vote
3 answers

OpenSSH server reporting conflicting authentication methods

We're having problems connecting to a server using a password over SSH. What makes the situation strange is that I see contradictory authentication methods available: $ ssh -v user@example.com -o PreferredAuthentications=password OpenSSH_7.9p1,…
BoppreH
  • 113
  • 1
  • 7
1
vote
0 answers

How to confgure multi realm Kerberos

Intention I want to set up 2 Kerberos realms where one can authenticate the users in the other. Current Setup I have 2 Kerberos Servers (ad.somedomain.com and kerb.foo.bar) I have my users on kerb.foo.bar User user1 alice bob I can…
1
vote
0 answers

Nginx basic_auth for entire site (reverse proxy) except for a "hidden" URL which should access all content without basic_auth

TL'DR set a gibberish URL in nginx site definition that would bypass basic-auth to reverse-proxy More details: I have a setup with Grafana running on a VPS and an nginx reverse proxy directing towards it behind basic auth. The setup works fine but…
1
vote
1 answer

LDAP SSSD SHA-512 authentication failure

I have a server with helm-openldap and a debian client. I can't login to a user who has a SHA-512 encrypted password. If i store it in clear or MD5, it works perfectly. $ id tuser uid=5000(tuser) gid=5000(tuser)…
ange
  • 13
  • 3
1
vote
2 answers

Connect Access 2016 to remote SQL Server - SQL Server Error 17

Good morning, I am trying to connect to a SQL server from a remote machine, with ACCESS 2016, using the "External data" option. Both are on the same network. It is important to note that I am connected as a domain verified user. I create a new…
1
vote
1 answer

Kerberos failures with accountname "host"

Since May, our reporting tools are showing lots of failed authentication attempts against some of our DCs, for an account named host (which does not exist). Event Viewer shows those failures as ID 4768 events: A Kerberos authentication ticket (TGT)…
Panki
  • 163
  • 2
  • 10
1
vote
2 answers

ssh ProxyJump and Port Forwarding with hostbased authentication

I am trying to access a compute node on a cluster via the head node of the cluster and a public entry node. The user is known on both the entry node and the head node, but not and also on the compute node. However, passwords are not available on…
loris
  • 232
  • 1
  • 12
1
vote
0 answers

How to configure group based LDAP access to Mercurial

I currently have LDAP authentication configured for Mercurial using the following Apache configuration: AuthBasicProvider ldap AuthType basic AuthName "Mercurial Repository" AuthBasicAuthoritative on …
Alan Spark
  • 143
  • 7
1
vote
1 answer

Error with database authentication in Apache Guacamole

I'm setup a new Ubuntu Server 22.04 VM and am following the documentation here: https://guacamole.apache.org/doc/gug/jdbc-auth.html Guacamole 1.4 installs fine along with Tomcat9 and Nginx proxy; I can access the site fine with…
S3rvant
  • 21
  • 6
1
vote
0 answers

Is one of Anonymous or Windows Authentication really required for IIS when hosting an ASP.NET CORE application

I have an ASP.NET CORE application hosted in IIS. The application uses OAUTH/OIDC for authenticating API requests. I have observed that if neither Anonymous nor Windows Authentication is activated then requests are rejected by IIS and do not make…
Tom Carter
  • 111
  • 3