Questions tagged [authentication]

A process of proving that an entity (commonly a user or organization) is who they claim to be, or who they were previously identified as being. Authentication does not guarantee that particular entity's identity absolutely, it just proves that they are the same agent that has previously successfully asserted their identity. There are three factors (types) of authentication, and a particular authentication process may combine two or more different factors.

Authentication is critical to systems security. It is the mechanism an authoritative system uses to validate a given entity's asserted identity (who they claim to be) is the same as that entity's stored credentials. Credentials must be previously stored for an entity either by the authoritative system, or by another trusted system, before authentication can occur.

Authentication is commonly used in real life in a number of different scenarios, for example a national border agent confirming a person's identity using a passport.

Authentication usually requires the entity being authenticated to produce one or more tokens. These tokens are then used, possibly alongside other properties or characteristics of the entity, to confirm their identity. An example of an authentication token is a password. These tokens can fall into three broad categories, or factors:

  • Something you know. This is the most commonly used authentication factor in electronic systems. It is most commonly implemented as a password or PIN (personal identification number). This is also the most commonly misused authentication factor. Many system require a secondary security question, such as your mother's maiden name, place you were born in or other such trivia. These all belong to this single factor, thus systems can as as many questions as they like and they are still single factor authentication; all the answers are something the entity would know.
  • Something you have. This is most commonly implemented as a formula number generator (like an RSA Key Fob) or a digital certificate (which can be stored on a smart card or less securely as a simple file on a computer). The Key Fobs, Smart Cards, and SSL Certificates are the most commonly used forms of this factor.
  • Something you are. This is commonly known as biometric security. Fingerprints and iris scans are the most common form when used with electronic access systems. Fingerprints and DNA are the most commonly used in law enforcement.

It should be noted that some security experts have reservations about the factor categories. Specifically all authentication factors are fed into the authentication mechanism as computerized information and are therefore subject to the same possible tampering or forgery as any other information. Digital Certificates for example are essentially passwords that are so long a normal person would never memorize it; it must be stored on a medium (thus termed "something you have"). Similarly anyone who has seen a spy movie has undoubtedly seen a fictional character copy a fingerprint or fake an iris scan. This is possible because the authentication mechanism is reliant on a digital reproduction of the physical item; a digital representation that can be duplicated.

There are many indirect authentication schemes as well. Kerberos is one of the most popular, you authenticate against a central store, which then gives you a token. The token can then be used to grant you access to other systems in lieu of the original authentication mechanism.

Authentication should not be confused with Authorization, which involves granting rights to a specific entity. Authorization schemes are commonly dependent on Authentication to ensure security, but are not the same.

See Wikipedia for more information about Authentication and Security.

2218 questions
1
vote
1 answer

Editing Authselect files

I'm hardening fedora OS following the CIS Benchmark for fedora 28. In one of the remediations, the Benchmark provides an script that modifies the files system-auth and password-auth. When I apply the changes with authselect apply-changes I get an…
Luis Gc
  • 11
  • 1
  • 2
1
vote
0 answers

AWS data storage: how much to store with Cognito

I am new here. This is rather a choice-based question rather than purely technical one. Many mobile apps authenticate with Cognito, and I am going to use the same for ease of use + free tier advantage. However, to enable some functionality, I must…
1
vote
2 answers

Connecting to BOTH Compliance and Exchange online in Powershell using Modern Auth

In the world of basic authentication, I used to connect to MSOL, Compliance and Exchange in a series that went like this: function ConnectToCloud() { $CloudCredentials = import-clixml C:\tools\CloudCreds.xml …
1
vote
2 answers

How to block crawlers like google from indexing gitlab?

How can I block any crawlers to access anything on gitlab? there should be a robots.txt or something similar to tell not to crawl. That would be good as a first step. But the more important thing, how can I tell gitlab only authenticated access is…
cilap
  • 277
  • 5
  • 14
1
vote
0 answers

Apache without any auth module

I do not have any need for Authentication/authorization modules on apache2.4, so I proceed to comment out all the Auth modules and all the Require directives. The server goes up fine, but i get a 500 error for everything. And the logs show AH00025:…
gcb
  • 344
  • 1
  • 4
  • 18
1
vote
3 answers

Biometeric authentication with Active Directory

There has been various blogs, MSDN pages, posts, etc. about Windows 7 and Windows 2008 R2 supporting biometric authentication built-in (or so it seems). (http://technet.microsoft.com/en-us/library/dd759228.aspx) In Windows 7 and Windows 2008 R2 it…
1
vote
0 answers

Unable to ssh with public / private key pair

I'm unable to connect (ssh) to one of my servers with pubkey. It was working last week, and I have no idea where to search right now. I have a script which should fetch files with scp to use them locally, that fails with an error: identity_sign:…
1
vote
1 answer

Using auth0 on AWS EC2 in a Shiny app using RStudio

I am trying to use auth0 on AWS EC2 (Ubuntu) using RStudio using the R package - auth0. To make the Shiny app publicly accessible, I have the port 8100 (this is where the app is hosted) open to the public. Further, I am using the…
1
vote
0 answers

Disable Azure/Office MFA on all users

We have created a new Office Tenant. Now all users are required to use the Multi Factor Authentication. How can I disable this policy? I know that I can't disable it for gloabl admins. That's fine - but I need to disable this for all users. In the…
0
votes
1 answer

Linux PAM authentication without asking for username and password

Is it possible to authenticate user without asking him to provide username/password and using only "second factor", i.e USB drive or fingerprint device? The idea is that I just want to insert the device to PC and to authenticate to this Linux…
MrMan
  • 1
0
votes
1 answer

mongodb - require authentication on database basis?

Is it possible to require authentication only on specific mongodb databases (leaving other databases with free access with no authentication requirements)?
GKman
  • 495
  • 3
  • 9
  • 16
0
votes
1 answer

NGINX stuck in endless redirect loop when trying to use auth_request

nginx version: 1.14.2 Im trying to use nginx auth_request to authenticate users for accessing a subdomain on which a page is served that i cant otherwise influence. I have a python + flask based login page which returns 200 if the user is logged in,…
laundmo
  • 101
  • 4
0
votes
1 answer

Strange FreeRadius and Kerberos issue

Currently I am trying to get my FreeRadius server to talk to my FreeIPA server and through some Googling I discovered I need to have FreeRadius talk to Kerberos in order to do user look ups. So I make a Krb5 file located at…
Adam
  • 3
  • 1
0
votes
0 answers

Kerberos issue through RRAS VPN

I set up a Windows VPN infrastructure with RRAS NPS CA roles. A user certificate is deployed on each laptop and are joined to a single domain. VPN use IKEv2. VPN is UP, communications are working to our internals networks, except applications that…
ThomasKel
  • 1
  • 1
0
votes
1 answer

In mutual authentication, if a client certificate is known, does it need to be CA signed to prevent a MITM attack?

Take an example: A povider has setup an API. Both parties (provider and client) trust eachother. Mutual authentication is required by provider. Client generates a SSL certificate and sends it by SFTP over to the provider. Does that client…
Blue Keys
  • 3
  • 2