Questions tagged [authentication]

A process of proving that an entity (commonly a user or organization) is who they claim to be, or who they were previously identified as being. Authentication does not guarantee that particular entity's identity absolutely, it just proves that they are the same agent that has previously successfully asserted their identity. There are three factors (types) of authentication, and a particular authentication process may combine two or more different factors.

Authentication is critical to systems security. It is the mechanism an authoritative system uses to validate a given entity's asserted identity (who they claim to be) is the same as that entity's stored credentials. Credentials must be previously stored for an entity either by the authoritative system, or by another trusted system, before authentication can occur.

Authentication is commonly used in real life in a number of different scenarios, for example a national border agent confirming a person's identity using a passport.

Authentication usually requires the entity being authenticated to produce one or more tokens. These tokens are then used, possibly alongside other properties or characteristics of the entity, to confirm their identity. An example of an authentication token is a password. These tokens can fall into three broad categories, or factors:

  • Something you know. This is the most commonly used authentication factor in electronic systems. It is most commonly implemented as a password or PIN (personal identification number). This is also the most commonly misused authentication factor. Many system require a secondary security question, such as your mother's maiden name, place you were born in or other such trivia. These all belong to this single factor, thus systems can as as many questions as they like and they are still single factor authentication; all the answers are something the entity would know.
  • Something you have. This is most commonly implemented as a formula number generator (like an RSA Key Fob) or a digital certificate (which can be stored on a smart card or less securely as a simple file on a computer). The Key Fobs, Smart Cards, and SSL Certificates are the most commonly used forms of this factor.
  • Something you are. This is commonly known as biometric security. Fingerprints and iris scans are the most common form when used with electronic access systems. Fingerprints and DNA are the most commonly used in law enforcement.

It should be noted that some security experts have reservations about the factor categories. Specifically all authentication factors are fed into the authentication mechanism as computerized information and are therefore subject to the same possible tampering or forgery as any other information. Digital Certificates for example are essentially passwords that are so long a normal person would never memorize it; it must be stored on a medium (thus termed "something you have"). Similarly anyone who has seen a spy movie has undoubtedly seen a fictional character copy a fingerprint or fake an iris scan. This is possible because the authentication mechanism is reliant on a digital reproduction of the physical item; a digital representation that can be duplicated.

There are many indirect authentication schemes as well. Kerberos is one of the most popular, you authenticate against a central store, which then gives you a token. The token can then be used to grant you access to other systems in lieu of the original authentication mechanism.

Authentication should not be confused with Authorization, which involves granting rights to a specific entity. Authorization schemes are commonly dependent on Authentication to ensure security, but are not the same.

See Wikipedia for more information about Authentication and Security.

2218 questions
1
vote
0 answers

ca-certificates.crt doesn't include my custom CA certificate after "sudo update-ca-certificates"

I'm trying to install the public CA certificate of a 3rd party service, onto a Debian instance. I'm doing this so that the SSL certificate of the 3rd party service that I'm connecting to can be validated as a trusted authority. I have a public .pem…
1
vote
3 answers

Moving from OpenLDAP/Kerberos to Active Directory

I have a well working setup using OpenLDAP for user information and Kerberos for authentication, but we need to have windows integration too, and for this we have decided that moving into Active Directory could be a good idea. Moving account…
1
vote
1 answer

MySQL 8.0 Installation on Unbuntu 20.04 authentication_string Message

i followed several tutorials to install MySQL 8.0 on Ubuntu 20.04. Everything works with no errors reported in the mysql log. The question i have is that when i enter this command: SELECT user,authentication_string,plugin,host FROM mysql.user; it…
lee03
  • 13
  • 3
1
vote
1 answer

Is it possible to use a auth_basic password protection using linux users and passwords?

I'd like to password protect a website allowing only Linux users and their passwords stored in /etc/passwd and /etc/shaddow to login. Apache and nginx allow to restrict accessung by using a HTTP auth_basic using specific user and password files. Is…
lumbric
  • 234
  • 2
  • 9
1
vote
0 answers

ownCloud stay logged in with files_external

I'm using ownCloud via the Docker image owncloud/server:10.5 and miss a Stay logged in checkbox. The documentation says that apps like files_external will disable this checkbox. There are some users on my server who have active external storages…
Danitechnik
  • 141
  • 4
1
vote
0 answers

WPA2-EAP MSCHAP-V2 NTLM_AUTH and SQL auth

Good morning, I've running an instance of freeradius 3.0 to use WPA2-Enterprise authentication on my wireless lan. The authentication aggainst the AD works like a charm using ntlm_auth, but now I'm trying to authenticate the users being not in the…
maxulm
  • 11
  • 1
1
vote
1 answer

Does AD B2C offer in-app authentication instead of jumping to b2clogin.com

my customer is using AD B2C to authenticate their users to their web sites and mobile apps. However, the requirement for one of the apps is that the sign up process should be done IN-APP, meaning that the user should NOT be taken off the app to…
1
vote
1 answer

Using SSSD with multiple LDAP servers/domains

I need to authenticate users using two separate LDAP servers. Have configured SSSD with two domains but only one seems to be working. I ran the command authconfig --enablemkhomedir --enablesssd --enablesssdauth --updateall and updated sssd.conf as…
1
vote
2 answers

How can I provide authentication and authorization of web pages using mod_ldap and mod_authnz_ldap on Apache httpd with AD to many users?

I'm trying to provide hundreds of users on our Apache httpd site the ability to restrict access to their web pages by different users and groups in our AD server through .htaccess. Apache lets me do that easily with mod_ldap and mod_authnz_ldap,…
Jason K
  • 13
  • 3
1
vote
0 answers

curl not sending credentials during negotiation

We have a Jenkins server that uses Kerberos-SSO, with a fallback to Basic if SSO is not configured on the browser or using curl. When I use curl with the --negotiate argument, however, it doesn't send basic credentials information when asked for it…
1
vote
0 answers

How to do something like in applicationHost.config to apply sslFlags to "/" but nothing within the virtual directory?

On an IIS 10.0 server hosting https://example.com, what do I put in my applicationHost.config so that all of the following is true: https://example.com/ does not request a client certificate. https://example.com/index.html does not request a client…
1
vote
0 answers

Login Active-Directory account require different username values in loginwindow and switch user

I've just bind my machine (running Mojave) to new AD server and would like to login to an existing AD account from loginwindow startup screen, but all I get is a tilted password record (indicator that occur once password is incorrect). Apparently,…
1
vote
1 answer

HTTP authentication with public/private key pair

I'm looking for a way to authenticate clients/users at a web server with public/private key pairs and already read this question: Public key authentication or similar over HTTP/HTTPS? The answers are similiar to everything I found on the web. In…
1
vote
1 answer

krbtgt password expiration policy

I am asking about krbtgt password in Active directory which is used to encrypt tickets issued by KDC,what i know is that this krbtgt account has a security issue that it's password is rarely changed. but when i run net user krbtgt /domain i found…
665bassem
1
vote
0 answers

Remote Desktop to W10 with NTLM Disabled

We recently disable NTLM on our DCs (Default Domain Controllers Policy - Restrict NTLM: Deny all The problem is when some (not all) Windows 10 workgroup clients (connected with VPN) try to open a Remote Desktop to some Windows 10 Domain Clients they…