Questions tagged [authentication]

A process of proving that an entity (commonly a user or organization) is who they claim to be, or who they were previously identified as being. Authentication does not guarantee that particular entity's identity absolutely, it just proves that they are the same agent that has previously successfully asserted their identity. There are three factors (types) of authentication, and a particular authentication process may combine two or more different factors.

Authentication is critical to systems security. It is the mechanism an authoritative system uses to validate a given entity's asserted identity (who they claim to be) is the same as that entity's stored credentials. Credentials must be previously stored for an entity either by the authoritative system, or by another trusted system, before authentication can occur.

Authentication is commonly used in real life in a number of different scenarios, for example a national border agent confirming a person's identity using a passport.

Authentication usually requires the entity being authenticated to produce one or more tokens. These tokens are then used, possibly alongside other properties or characteristics of the entity, to confirm their identity. An example of an authentication token is a password. These tokens can fall into three broad categories, or factors:

  • Something you know. This is the most commonly used authentication factor in electronic systems. It is most commonly implemented as a password or PIN (personal identification number). This is also the most commonly misused authentication factor. Many system require a secondary security question, such as your mother's maiden name, place you were born in or other such trivia. These all belong to this single factor, thus systems can as as many questions as they like and they are still single factor authentication; all the answers are something the entity would know.
  • Something you have. This is most commonly implemented as a formula number generator (like an RSA Key Fob) or a digital certificate (which can be stored on a smart card or less securely as a simple file on a computer). The Key Fobs, Smart Cards, and SSL Certificates are the most commonly used forms of this factor.
  • Something you are. This is commonly known as biometric security. Fingerprints and iris scans are the most common form when used with electronic access systems. Fingerprints and DNA are the most commonly used in law enforcement.

It should be noted that some security experts have reservations about the factor categories. Specifically all authentication factors are fed into the authentication mechanism as computerized information and are therefore subject to the same possible tampering or forgery as any other information. Digital Certificates for example are essentially passwords that are so long a normal person would never memorize it; it must be stored on a medium (thus termed "something you have"). Similarly anyone who has seen a spy movie has undoubtedly seen a fictional character copy a fingerprint or fake an iris scan. This is possible because the authentication mechanism is reliant on a digital reproduction of the physical item; a digital representation that can be duplicated.

There are many indirect authentication schemes as well. Kerberos is one of the most popular, you authenticate against a central store, which then gives you a token. The token can then be used to grant you access to other systems in lieu of the original authentication mechanism.

Authentication should not be confused with Authorization, which involves granting rights to a specific entity. Authorization schemes are commonly dependent on Authentication to ensure security, but are not the same.

See Wikipedia for more information about Authentication and Security.

2218 questions
1
vote
1 answer

Squid basic auth connection problems

We are using squid proxy with basic authentication. Each user has it's own outgoing ip configured. See parts of our squid.conf: # Authentication Basic Auth auth_param basic program /usr/lib/squid/basic_ncsa_auth /etc/squid/passwords auth_param basic…
1
vote
1 answer

Authentication failed: TImeout for cockpit access in CentOS 7

PROBLEM When I try to login to cockpit on CentOS 7 using URL https://localhost:9090 using the root credentials, I get Authentication failed: Timeout error. Have searched the web for solution but not able to troubleshoot the problem. STEPS USED TO…
1
vote
1 answer

Requirements for RDP from Azure AD Registered device

We are a small company (4 users, 7 devices) and have recently moved from a mess of local accounts on our PCs to using Azure AD for Office 365. The plan was to have accounts for each user and for anyone to log on to any machine with them, and to…
1
vote
0 answers

Samba/Winbind domain member authentication issue

In setting up a new Linux Samba fileserver as a AD member I keep running into an issue with authentication. It appears to be triggered by running with selinux in Enforcing mode after joining AD, but it doesn't go away if I turn off selinux with…
1
vote
0 answers

OpenLDAP: interpreting username@domainname as uid=username,ou=domainname

Is that possible to tweak some settings that would make OpenLDAP always interpreting uid=username@domainname as uid=username,ou=domainname in authentication queries? Of course, making the clients to do this job would be a much more ecological way,…
Volodymyr Melnyk
  • 577
  • 1
  • 5
  • 19
1
vote
2 answers

HTTPD server does LDAP authentication. How does the mechanism work?

I have a HTTPD apache server which does LDAP authentication. When the user hits the URL http://localhost/, a browser prompt pops up asking for username and password. How are the username and password carried from browser to the HTTPD server ? Are…
Vinayak
  • 73
  • 7
1
vote
0 answers

Keycloak: Difference between Authentication sessions and User Sessions

I was going through the documentation https://www.keycloak.org/docs/latest/server_installation/#cache Here they have described different types of caches. I didn't quite understand the definitions they provided for Authentication sessions and User…
MrRobot9
  • 123
  • 4
1
vote
1 answer

Chrome doesn't prompt to use a local certificate after setting up client certificate authentication on Apache

I have used this guide to set up client certificate authentication on Apache. I verified my certificate using the openssl verify directive (it's valid), I also successfully imported the PFX file into my macOS Keychain and set it to "Trust…
lesssugar
  • 121
  • 1
  • 5
1
vote
0 answers

How do I configure apache, so that my client certificate authentication works for two specific URLs only?

I'm following this guide in order to establish client-based, certificate authentication on my website. The goal: Allow 2 users access to 2 specific URLs: /login and /admin. When any of the 2 users access the mentioned locations, they need to provide…
lesssugar
  • 121
  • 1
  • 5
1
vote
0 answers

More explicit Nginx logs

I use nginx in my MacOS to test third-party authentications such as Google and Twitter in localhost. As a result, on my local website https://localhost:8000/..., I could engage with www.funfun.io for third-party authentications. Here is the nginx…
SoftTimur
  • 337
  • 2
  • 8
  • 16
1
vote
0 answers

Unable to log in with AD credentials

I have a DC (Debian) that seems to be working fine. I am able to join the domain but when I join a Fedora member it joins but the DNS isn't registered. I have to manually add the record to the dc. The Debian members join just fine. I am also…
1
vote
0 answers

Authenticating ftp against multiple (postgres) databases

Current State Given is a host with a couple of IPv4 addresses and HTTP & FTP access for each address; each vhost has access to a PostgreSQL database. Web- and ftp-authentication is done against the respective database; for proftpd I use this setup…
SlowFox
  • 11
  • 2
1
vote
0 answers

Downgrade Google Identity Platform back to Firebase Authentication

We used Firebase Authentication and were happy about it. Then I clicked the "migrate to Identity Platform" button — but that was a mistake. We don't use any of the advantages but end up paying the fees. How can I downgrade it back to Firebase…
1
vote
4 answers

IIS time is different from server time

I have ASP.NET 2.0 site configured to perform Windows Integrated Security using Kerberos delegation. The servers including DC are running on Windows 2003 and the delegation is raised to Windows 2003 level. BTW, all servers are set to EST The…
G33kKahuna
  • 289
  • 1
  • 4
  • 10
1
vote
0 answers

Temporarily disable minimum password time in FreeIPA after password reset by support

We use FreeIPA 4.6.8 and we have users that of course forget their passwords. However, password policy has a minimum password time of 1 hour. When support resets their password for them and provides it via separate & secure channel, they also send…
Foghorn
  • 123
  • 6