2.4 - Authentication and Authorization Design Concepts Flashcards
1
Q
Directory Services
A
- A feature that keep all of an organization’s usernames / passwords in a single database
- Also contains computers, printers, and other devices that might be connected to a network
- Large distributed database
- Constantly replicated so that every DB is always up to date with latest info
- This means a user only needs one set of credentials for all services
2
Q
Microsoft Active Directory
A
- One of the most common examples of Directory Services
- Accessed via Kerberos protocol or LDAP
- This allows access to a DB from an external device
3
Q
Federation
A
- Instead of maintaining your own DB of usernames / passwords (Directory Services)
- Federation allows users access to your network from information that is stored by a third party
- Federation is an alternative - Use authentication information that is already at another site
- Not just employees - partners, suppliers, customers, etc.
- Provides SSO and more
4
Q
Enable Federation
A
- Need to coordinate authentication / authorization between two organizations
- Ex: Log in page that allows you to log into site X via Facebook, LinkedIn, Twitter, etc.
- Once trust relationship is established with this third party, users can use other credentials to log in to your network
5
Q
Attestation
A
- Want to make sure users are connecting to our network using our hardware (not a 3rd party)
- Prove the hardware you’re using is really yours (a system you can trust)
- AKA can the hardware attest that it is the hardware it should be
- Ex: if managing a single device, it’s easy to determine this, but if you’ve got thousands of devices you need to automate it
6
Q
Remote Attetstation
A
- Remote device provides operational support to a verification server
- Will allow / prevent access to network
- Encrypted and digitally signed with the TPM (Trusted Platform Module) of the remote device
- An IMEI (International Mobile Equipment Identification Number) or other unique hardware component can be included in the report
- This will confirm that the device on the other end of the communication is trustworthy and allowed access
7
Q
SMS
A
- Short Message Service (text message)
- Login factor can be sent via SMS to send a code and the user uses this code to login
- This confirms that you are the person that has the phone (hardware in your position)
- An example of Remote Attestation
- However generally seen as less secure than other methods (ex: user an reprogram the number that the code is being sent to. they can also be intercepted.) These types of issues are relatively rare, but they exist
- MFA is better than single authentication.
8
Q
Push Notification
A
- Instead of an SMS, can rely on a similar process to an SMS notification
- server is “pushing” Authentication Factor is to a specialized app on a device.
- Usually on a mobile device
- Another example of Remote Attestation
- Security Concerns: The app receiving the push notification could have vulnerabilities that let 3rd parties see info or perhaps it doesn’t have encryption
- Probably more secure than SMS with the right app
- MFA is better than single authentication
9
Q
Authentication Apps
A
- Pseudo random token generators
- Useful authentication factor
- Ex: RSA physical device or RSA app
10
Q
TOTP
A
- Time-based One-Time Password algorithm
- Use a secret key and the time of day
- No incremental counter
- Usually available around 30 sec
- One time synchronization process, for setup, with a secret key + time of day. The authentication server and token generator will know what the next number in sequence will be based on the time of day
- Used by many token generators (like RSA)
- Commonly used: enter user name, password, open app and enter the number in a box (If you’ve used MFA ex: Microsoft, google, etc probably used TOTP, it’s pretty common OTP method)
11
Q
HOTP
A
- HMAC-based One-Time Password algorithm
- Another authentication method
- One-time password
- Similar to TOTP, but instead of having a number that changes every 30 sec, you have a number you use once then throw away
- Keys are based on a keyed hash method code (HMAC) and a counter (go down a list and use the code then cross it off and go down the list)
12
Q
HMAC
A
- Keyed-hash message authentication code
- keys are based on a secret code + counter (check codes off list)
- Example of HOTP (HMAC - based One-Time Password Algorithm)
13
Q
Token-based authentication
A
- Hash is different every time, could be an app
- will integrate with server for authentication
- Can be an example of HOTP
14
Q
Hardware and software token available
A
- Need additional technology to make this work
15
Q
Phone call
A
- An automated process can call you and tell you the pseudo random token generators
- Similar disadvantages to SMS (can be intercepted or forwarded, phone number can be added to a phone number (meaning it rings across multiple phones simultaneously so someone else can answer first))