Questions tagged [authentication]

A process of proving that an entity (commonly a user or organization) is who they claim to be, or who they were previously identified as being. Authentication does not guarantee that particular entity's identity absolutely, it just proves that they are the same agent that has previously successfully asserted their identity. There are three factors (types) of authentication, and a particular authentication process may combine two or more different factors.

Authentication is critical to systems security. It is the mechanism an authoritative system uses to validate a given entity's asserted identity (who they claim to be) is the same as that entity's stored credentials. Credentials must be previously stored for an entity either by the authoritative system, or by another trusted system, before authentication can occur.

Authentication is commonly used in real life in a number of different scenarios, for example a national border agent confirming a person's identity using a passport.

Authentication usually requires the entity being authenticated to produce one or more tokens. These tokens are then used, possibly alongside other properties or characteristics of the entity, to confirm their identity. An example of an authentication token is a password. These tokens can fall into three broad categories, or factors:

  • Something you know. This is the most commonly used authentication factor in electronic systems. It is most commonly implemented as a password or PIN (personal identification number). This is also the most commonly misused authentication factor. Many system require a secondary security question, such as your mother's maiden name, place you were born in or other such trivia. These all belong to this single factor, thus systems can as as many questions as they like and they are still single factor authentication; all the answers are something the entity would know.
  • Something you have. This is most commonly implemented as a formula number generator (like an RSA Key Fob) or a digital certificate (which can be stored on a smart card or less securely as a simple file on a computer). The Key Fobs, Smart Cards, and SSL Certificates are the most commonly used forms of this factor.
  • Something you are. This is commonly known as biometric security. Fingerprints and iris scans are the most common form when used with electronic access systems. Fingerprints and DNA are the most commonly used in law enforcement.

It should be noted that some security experts have reservations about the factor categories. Specifically all authentication factors are fed into the authentication mechanism as computerized information and are therefore subject to the same possible tampering or forgery as any other information. Digital Certificates for example are essentially passwords that are so long a normal person would never memorize it; it must be stored on a medium (thus termed "something you have"). Similarly anyone who has seen a spy movie has undoubtedly seen a fictional character copy a fingerprint or fake an iris scan. This is possible because the authentication mechanism is reliant on a digital reproduction of the physical item; a digital representation that can be duplicated.

There are many indirect authentication schemes as well. Kerberos is one of the most popular, you authenticate against a central store, which then gives you a token. The token can then be used to grant you access to other systems in lieu of the original authentication mechanism.

Authentication should not be confused with Authorization, which involves granting rights to a specific entity. Authorization schemes are commonly dependent on Authentication to ensure security, but are not the same.

See Wikipedia for more information about Authentication and Security.

2235 questions
4
votes
1 answer

LDAP authentication ... Log in fail on the LDAP client

I can get the password and group from the LDAP client getent passwd getent group work sucessfully But when I try 'su USERNAME' the name from the LDAP server or 'ssh USERNAME@localhost' it prompt me a user password, I typed exactly the USERNAME…
billyduc
  • 1,627
3
votes
3 answers

How do you handle authentication across domains?

I'm trying to save users of our services from having to have multiple accounts/passwords. I'm in a large organization and there's one group that handles part of user authentication for users who are from outside the facility (primarily for…
2
votes
4 answers

AWS Cognito authentication equivalent on google cloud platform - secure a web app using google id authentication

Is there anything similar to AWS Cognito authentication equivalent on google cloud platform?
Kam
  • 29
2
votes
1 answer

Windows authentication skip for one folder and allow local domain's user

I have intranet application with windows authentication on it. Annonymous users are not allowed. Now i am trying to add one subfolder which should be allowed to local domain users too. I enabled "annonymous access" iis on that subfolder and that…
Developer
1
vote
0 answers

Best practices for authentication domains

We are deploying web applications that require username/password logins. We are also managing the infrastructure that supports the web applications. I have researched and have been unable to find any resources related to best practices for whether…
Jokajak
  • 29
1
vote
2 answers

Authentication / Encryption methods for distributed nodes?

I've got a project that will see a bunch of nodes [Raspberry Pis] being distributed to various geographically distributed clients. Naturally, I am wanting to deploy an authentication / encryption system between the master server and the nodes. In my…
swx
  • 13
1
vote
5 answers

computer authentication

I have a server and several clients (The technology is not important in the moment. It can be any.). I need to authenticate the computers. They are located in several offices geographically allocated with dynamic IP addresses. I do not trust the…
0
votes
1 answer

Windows Update seems to break authentication

We have several production servers with 2012r2 installed and have noticed in the last couple of days that they are reporting that they need to be authenticated. These are all open license Server 2012r2 standard. When trying to authenticate the…
0
votes
1 answer

Pass through authentication does not work with a specific account in Windows XP Home

I have a simple network that consists of a Windows 2003 Server connected to a number of Windows XP Home machines. I do not have a domain setup, so the computers are connected to the same workgroup. I share a number of resources on the Windows 2003…
jmatthias
  • 139
0
votes
1 answer

Where can I get other Authentication options for IIS?

I notice that other IIS Admin have the following Authentication options: But I only have the first two Authentication options - Anonymous Authentication and ASP.NET Impersonation. How can I get the rest of the options display in the Authentication…
Jack
  • 107
0
votes
2 answers

Two Factor Authentication

I've boiled Two factor authentication down from all my research and come to the conclusion I'd like to do it with "Something someone HAS" and "Something someone KNOWS" I have a few options but I'd like to know if the really count as 2 Factor…