Questions tagged [authentication]

A process of proving that an entity (commonly a user or organization) is who they claim to be, or who they were previously identified as being. Authentication does not guarantee that particular entity's identity absolutely, it just proves that they are the same agent that has previously successfully asserted their identity. There are three factors (types) of authentication, and a particular authentication process may combine two or more different factors.

Authentication is critical to systems security. It is the mechanism an authoritative system uses to validate a given entity's asserted identity (who they claim to be) is the same as that entity's stored credentials. Credentials must be previously stored for an entity either by the authoritative system, or by another trusted system, before authentication can occur.

Authentication is commonly used in real life in a number of different scenarios, for example a national border agent confirming a person's identity using a passport.

Authentication usually requires the entity being authenticated to produce one or more tokens. These tokens are then used, possibly alongside other properties or characteristics of the entity, to confirm their identity. An example of an authentication token is a password. These tokens can fall into three broad categories, or factors:

  • Something you know. This is the most commonly used authentication factor in electronic systems. It is most commonly implemented as a password or PIN (personal identification number). This is also the most commonly misused authentication factor. Many system require a secondary security question, such as your mother's maiden name, place you were born in or other such trivia. These all belong to this single factor, thus systems can as as many questions as they like and they are still single factor authentication; all the answers are something the entity would know.
  • Something you have. This is most commonly implemented as a formula number generator (like an RSA Key Fob) or a digital certificate (which can be stored on a smart card or less securely as a simple file on a computer). The Key Fobs, Smart Cards, and SSL Certificates are the most commonly used forms of this factor.
  • Something you are. This is commonly known as biometric security. Fingerprints and iris scans are the most common form when used with electronic access systems. Fingerprints and DNA are the most commonly used in law enforcement.

It should be noted that some security experts have reservations about the factor categories. Specifically all authentication factors are fed into the authentication mechanism as computerized information and are therefore subject to the same possible tampering or forgery as any other information. Digital Certificates for example are essentially passwords that are so long a normal person would never memorize it; it must be stored on a medium (thus termed "something you have"). Similarly anyone who has seen a spy movie has undoubtedly seen a fictional character copy a fingerprint or fake an iris scan. This is possible because the authentication mechanism is reliant on a digital reproduction of the physical item; a digital representation that can be duplicated.

There are many indirect authentication schemes as well. Kerberos is one of the most popular, you authenticate against a central store, which then gives you a token. The token can then be used to grant you access to other systems in lieu of the original authentication mechanism.

Authentication should not be confused with Authorization, which involves granting rights to a specific entity. Authorization schemes are commonly dependent on Authentication to ensure security, but are not the same.

See Wikipedia for more information about Authentication and Security.

2218 questions
1
vote
1 answer

Apache HTTP with Kerberos not working with Chromium-powered navigators on machines outside of domain

Here is the Apache HTTP Kerberos module configuration in /etc/apache2/sites-available/my.server.tld.conf: # ... Authname "SSO Authentication" AuthType Kerberos KrbAuthRealms MY.DOMAIN.TLD KrbServiceName…
kagmole
  • 113
  • 6
1
vote
1 answer

System-wide Docker login?

Is there any way to log a whole machine / Docker daemon into a registry? Everything I see about docker login and various proprietary credentials helpers uses ~/.docker/config.json, i.e. is per-user. I have a situation where I would like to pull…
Bernd Haug
  • 888
  • 5
  • 12
1
vote
0 answers

Freeradius doesn't start when CoS user attributes are configured

I have a problem with a POC, I tried use Freeradius for authentication purpose and assign attributes for users of a broadband network (PPPoE). When I configure the user with this parameters I can connect the PPPoE client in the network and the…
1
vote
0 answers

Linking authentication FreeIPA and SSO

Long story short, my goal is to have all user permissions managed in one place and then deployed everywhere. My thoughts are that Active Directory/FreeIPA is perfect for this sort of thing. It also comes in handy because some users will need to…
1
vote
0 answers

Enforce kerberos authentication for each IIS site without individual site developers being able to disable it

We have a IIS server with multiple sites that are managed by different teams. We want to standardize on and enforce Kerberos autentication for all sites with each site having an individual AD group for authorization/access. The obvious solution…
invictus
  • 135
  • 1
  • 10
1
vote
1 answer

Can you recommend a robust OpenAPI 2.0 provider?

Help me find a robust OpenID 2.0 provider! We're looking at various SSO solutions for our organization, and I would like to suggest OpenID as a viable option, since (a) there is good consumer support in a number of web applications, and (b) it's…
larsks
  • 43,623
  • 14
  • 121
  • 180
1
vote
0 answers

Apache with mod_authnz_external giving blank password

I am using apache2 with mod_authnz_external and pwauth for authentication. pwauth itself works (I verified by calling it from the command line), however when used by apache, I always get error code 2 back (password mismatch). By using a wrapper…
Johannes H.
  • 272
  • 2
  • 11
1
vote
0 answers

Why isn't Kerberos used for SSO to cloud apps?

When comparing Kerberos to SAML, a common argument on StackOverflow sites and the rest of Internet is that SAML is for Internet / cloud applications while Kerberos is for enterprise LAN. There are several claims to support such an…
Ryan
  • 187
  • 1
  • 1
  • 8
1
vote
0 answers

Can you implement token based authentication/authorization without a 3rd party?

fyi I'm a total newbie to server stuff (I'm an app developer, trying to implement a simple but secure api back end) It sounds simple enough, user sends his username/password, if it authenticates, you give them a token, and they include that token in…
Sam b
  • 11
  • 1
1
vote
0 answers

nginx unicorn rails authentication failure

I am following this tutorial to deploy a rails app on my cloud server. It's my first time deploying a rails project on a server. When trying to start unicorn or nginx from folder /app/current and user portfolio, I am getting the…
1
vote
0 answers

Is it possible to configure a machine wide WinRM client default authentication?

WinRM is the protocol used by Windows Machine when running remote commands, WinRM supports several authentication schemes. Is there a machine wide setting to control the default authentication mechanism used by the Invoke-Command commandlet when…
Chedy2149
  • 223
  • 4
  • 14
1
vote
0 answers

Lastlog to include ssh proxyjumps and imap authorizations

I want to know which of my users still actively use my server. The command lastlog tells me when they last logged in per ssh and spawned a shell on the server. It however does not tell me when they last successfully authorized and fetched their…
dan-ros
  • 111
  • 2
1
vote
0 answers

DMZ Member Servers unable to return or authenticate internal domain accounts

I have DC in a DMZ where I can easily look up domain accounts from our internal domain under the NTFS permission if I tried to add users/groups to folder NTFS permission whiles logged in to the DMZ DC. However, member servers in the same DMZ are…
1
vote
0 answers

Get diagnostics information from failed connect from Grafana to InfluxDB

I've tried to set-up a local Grafana instance in a Docker container and I'm trying to connect to my local InfluxDB that is running on the same machine. I can connect to InfluxDB without any issues, but when I want to setup Grafana to connect to the…
1
vote
0 answers

Podman not using credentials from authfile

I am in the process of deploying a containerized application that is created from an image stored in a private registry that requires authentication to access. Since I am using Ansible 2.9.14 I must use the authfile property as this is the only…
Aetonyx
  • 11
  • 1