2.4 - Authentication and Authorization Flashcards
What is a directory service?
It keeps all of the organization’s usernames and passwords in a single database (ex. AD).
Define federation and a federated network.
Federation : Providing network access to to others outside of the organization, not just employees - partners, suppliers, customers, etc.
Federated Network: Allows for authentication and authorization between two organizations (logging in with google credentials).
What is attestation?
Proving that the hardware is really yours or that the hardware is something that can be trusted interacting with or within a network.
Remote attestation: The device provides an operational report to a verification server. It is encrypted and digitally signed with the TPM. An IMEI or other unique hardware component can be included in the report.
How might one authenticate with SMS?
After you provided your login information, you receive an SMS to a predefined phone number.
What are some of the security issues that exist with SMS authentication?
1) The phone number can be reassigned to a
different phone
2) SMS messages can be intercepted
How might one authenticate with a push notification?
A similar process to SMS. The authentication factor is pushed to a specialized app. This is usually on a mobile device. More secure that SMS.
What are some of the security issues that exist with push notification authentication?
1) Applications can be vulnerable
2) Some push apps send in the clear
How might one authenticate with an authentication app?
A pseudo-random token generator on your phone.
Define TOTP.
Time-based One-Time Password algorithm
A secret key and the time of day are used to generate a token for authentication. The secret key is configured ahead of time, and timestamps are synchronized via NTP.
Google, Facebook, Microsoft, etc.
Define HOTP.
HMAC-based One-Time Password algorithm
Keyed- hash message authentication code (HMAC)
One- Time passwords are generated, once a session and each authentication attempt. The keys are based on a secret key and a counter. The hash is different every time.
How might one use a phone call to authenticate?
A voice call provides the token.
What are the security issues with using a phone call to authenticate?
1) Phone call can be intercepted or forwarded
2) Phone number can be added to another phone
What are some examples of static codes for authentication?
Personal Identification Number (PIN)
Password
Passphrase
How might one use a smart card to authenticate?
A smart card (something you have) can be used. It includes an integrated circuit, and it can be through contact or contactless. You must have the physical card.
Can be used in conjunction with other authentication methods.
What are some examples of biometric factors?
Fingerprint scanner, Retinal scanner, iris scanner, voice recognition, facial recognition
Gait analysis: Identify a person based on how they walk
Veins