Authentication Flashcards
Multi-factor Authentication
Use of two or more authentication factors to prove a user’s identity
• Knowledge
• Ownership
• Characteristic
• Location
• Action
One-Time Passwords
§ Time-based One Time Password (TOTP)
• A password is computed from a shared secret and current time
§ HMAC-based One Time Password (HOTP)
• A password is computed from a shared secret and is synchronized between the client and the server
Authentication Models
Context-aware Authentication
Single Sign-On (SSO)
Federated Identity Management (FIdM)
OpenID
Context-aware Authentication
§ Process to check the user’s or system’s attributed or characteristics prior to allowing it to connect
§ Restrict authentication based on the time of day or location
Single Sign-On (SSO)
A default user profile for each user is created and linked with all of the resources needed
Federated Identity Management (FIdM)
A single identity is created for a user and shared with all of the organizations in a federation
Cross-Certification
Federated Identity Management (FIdM)
Utilizes a web of trust between organizations where each one certifies others in the federation
Trusted Third-Party
Federated Identity Management (FIdM)
• Organizations are able to place their trust in a single third-party (also called the bridge model)
• Trusted third-party model is more efficient than a cross certification or web of trust model
Security Assertion Markup Language (SAML)
Attestation model built upon XML used to share federated identity management information between systems
OpenID
• An open standard and decentralized protocol that is used to authenticate users in a federated identity management system
• User logs into an Identity Provider (IP) and uses their account at Relying Parties (RP)
• OpenID is easier to implement than SAML
• SAML is more efficient than OpenID
802.1x
§ Standardized framework used for port-based authentication on wired and wireless networks
§ RADIUS
§ TACACS+
Extensible Authentication Protocol (EAP)
§ A framework of protocols that allows for numerous methods of authentication including passwords, digital certificates, and public key infrastructure
§ EAP-MD5 uses simple passwords for its challenge-authentication
§ EAP-TLS uses digital certificates for mutual authentication
§ EAP-TTLS uses a server-side digital certificate and a client-side password for mutual authentication
EAP-FAST
§ Provides flexible authentication via secure tunneling (FAST) by using a protected access credential instead of a certificate for mutual authentication
Protected EAP (PEAP)
Supports mutual authentication by using server certificates and Microsoft’s Active Directory to authenticate a client’s password
LEAP
LEAP is proprietary to Cisco-based networks