Authentication and Authorization Services Flashcards
Which factor of authentication would a password key fulfill?
Something you have.
A password key is a physical device.
Something you have.
Are credentials encrypted inside of a password manager/password vault?
Yes
Other than just the basic features of holding all your passwords in one place and creating random strong passwords they are also securely stored using encryption.
What is a TPM?
Trusted platform module.
This is hardware that is typically a part of your motherboard that helps with all of this encryption stuff.
It contains a cryptographic processor which has a random number generator and key generators.
Comes with unique keys burned in during production.
Can also store keys
What is a HSM? (hardware security module)
This is a centralized standalone server with specialized hardware for performing cryptographic function very quickly.
These allow for centralized store of all of our encryption and decryption keys used by an entire enterprise network or multiple other servers.
This Can offload CPU overheard from other devices such as servers because cryptography takes a lot of CPU. The thing inside of it that does this is called a cryptographic accelerator.
What is knowledge based authentication? (KBA)
This is using personal knowledge as an authentication factor.
Something you know.
There are two types:
Static KBA - pre configured shared secrets, often used with account recovery. “what is your mothers maiden name?”
Dynamic KBA - Questions are not pre configured. These questions are based on an identity verification service. “What was your street name when you lived in the zip code 32258”
What is a AAA server?
A server specifically designed to provide authentication, authorization, and accounting.
What is PAP? (password authentication protocol)
This is a basic authentication method.
Used in legacy operating systems (very old)
Pap is completely unencrypted. Non encrypted password exchange.
What is CHAP? (challenge handshake authentication protocol)
This is a step up from PAP.
This provides an encrypted challenge sent over the network.
Chap has a 3 way handshake.
Client sends their username unencrypted.
Chap sends a challenge(stored password+challenge), client responds with a password hash calculated from the challenge and their password.
Server compares received hash with the stored hash they have for that user.
This actually occurs periodically through the conversation but the end user never knows it is happening over and over.
What is MS-CHAP?
MS-CHAP is microsofts implementation of CHAP and it is incredibly outdated since it uses DES(data encryption standard) for encryption.
You want to use L2TP, IPsec, or 802.1x instead.
What is RADIUS?
Remote authentication dial-in user service
This is a very common solution for centralizing authentication for your users.
If a user is trying to authenticate from any part of your network (routers,switches,802.1x,etc) they can use RADIUS to authenticate their username and password.
What is TACACS?
Terminal access controller access control system.
This is a remote authentication protocol like RADIUS.
Cisco created a proprietary version of TACACS with additional support for accounting and auditing called XTACACS.
But if you see this being implemented today you will likely see the newest version of it TACACS+
What is Kerberos?
Kerberos is a network authentication protocol.
More complex than RADIUS/TACACS but more robust.
This is a type of authentications system that is able to use single sign on, which means you authenticate once and are trusted by the system without any need to re-authenticate to everything.
Unlike RADIUS and TACACS there is a mutual authentication as well. The server authenticates to you as well as you authenticating to the server. So both sides know exactly who they are talking to.
This protects against on-path or replay attacks.
Why is kerberos sometimes called a ticketing system?
The cryptography that is used is referenced as a cryptographic ticket.
When you authenticate to your authentication server you are given a service ticket.
And then instead of having to put in a username and password every time you access a different resource you simply have to show your service ticket.
Not everything is kerberos friendly though so you may find that some devices you do have to log into manually.
What would be the deciding factors when choosing between using RADIUS,kerberos, or TACACS+?
It is often determined by what is at hand, since they are all pretty similar.
If you have a Microsoft network you will be using kerberos by default.
If you have a bunch of cisco hardware then you may choose to set up TACACS+ for just those devices.
If your VPN concentrator can only talk to a RADIUS server than you probably want to use RADIUS.
What is 802.1x?
This is a port based Network Access control.
You don’t get access to the network until you authenticate.
This can be used for both wireless and wired connections.
We often integrate this with EAP.
On the back end we probably have a RADIUS, LDAP, TACACS+, or kerberos server to authenticate the user’s credentials.