4.2 Explain authentication and access controls. Flashcards
AAA framework
Identification - Usually your username
Authentication
Authorization
Accounting
Authentication
Prove you are who you say you are
Password and other authentication factors
Authorization
Based on your identification and authentication, what access do you have?
Accounting
Resources used: Login time, data sent and received, logout time
RADIUS (Remote Authentication Dial-in User Service)
One of the more common AAA protocols
Supported on a wide variety of platforms and devices
Not just for dial-in
Centralize authentication for users - Routers, switches, firewalls• Server authentication• Remote VPN access• 802.1X network access
RADIUS services available on almost any server operating system
TACACS
Terminal Access Controller Access-Control System
• Remote authentication protocol• Created to control access to dial-up lines to ARPANET
XTACACS (Extended TACACS)
A Cisco-created (proprietary) version of TACACS
Additional support for accounting and auditing
TACACS+
The latest version of TACACS, not backwards compatible
More authentication requests and response codes• Released as an open standard in 1993
Kerberos
Standard since the 1980s MIT RFC 4120 -Microsoft starting using Kerberos in Windows 2000
Network authentication protocol -Authenticate once, trusted by the system
Mutual authentication - the client and the server
Protect against man-in-the-middle or replay attacks
SSO with Kerberos
Authenticate one time
No constant username and password input! - Save time
Only works with Kerberos
LDAP (Lightweight Directory Access Protocol)
reading and writing directories over an IP network
Windows AD
LDAP is the protocol used to query and update an X.500 directory
MAC Apple OpenDirectory, OpenLDAP, etc
Builds a tree
Container objects
Country, organization, organizational units
Leaf objects
Users, computers, printers, files
Local authentication
Credentials are stored on the local device Does not use a centralized database
initial local account on device
Difficult to scale local accounts
Sometimes useful as a backup
Certificate-based authentication
Smart card
PIV (Personal Identity Verification) card
CAC (Common Access Card)
IEEE 802.1X