CH19 Authentication Flashcards
What are the 5 factors of authentication to consider?
- Knowledge – user providing password, PIN, etc.
- Ownership – User proving that they have something in their possession. Token devices, smart card, USB dongle
- Characteristics – something that the person is. Biometric technology. (finger print reader, eye scanner)
- Location – where the person when they are trying to log into their account.
- Action – checks how you do something (sign your name, for example)
If you are using one of these factors at a time to identify the user, it is called single-factor authentication.
If you are using 1. username (knowledge) and 2. password (knowledge), it is considered single-factor authentication. (same type of info)
If you are using 1. Smart token (possession) and 2. PIN (knowledge) , it is considered two factor authentication.
What is Time-based One Time password (TOTP) ?
A password is computed from a shared secret and current time. (Ex: RSA Key fobs)
What is HMAC-based One Time Password (HOTP) ?
a password is computed from a shared secret and is synchronized between the client and the server.
What is Context-aware authentication model?
Process to check the user’s or system’s attributes or characteristics prior to allowing it to connect.
Most common form is limiting the time or the day that the user is able to log on to a particular client or server. Limiting the login based on the geographical location of the user
What is Single Sign-On (SSO) authentication model?
A default user profile for each user is created and linked with all of the resources needed. It is much easier.
However, one major drawback is that once SSO credentials have been compromised, the attacker now has access to every resource that the user had access to
What is Federated Identity Management (FIdM) authentication model?
A single identity is created for a user and shared with all of the organizations in a federation. Federations support the provisioning and management of identification, authentication, and authorization.
What is the Federated Identity Management (FIdM) - Cross Certification ?
utilizes a web of trust between organizations. Each organization is going to certify every other organization inside the Federation
What is the Federated Identity Management (FIdM) - Trusted Third-Party (aka bridge model) ?
Organizations place their trust in a single third party. This third party, then manages the verification and certification for all the organizations within the Federation
Trusted third-party model is more efficient than a cross-certification or web of trust model.
What is Security Assertion Markup Language (SAML) ?
attestation model built upon XML used to share federated identity management information between systems
What is OpenID?
open standard decentralized protocol to authenticate users.
OpenID allows the user to log into a identity provider (IP) and they can then utilize that same account across all of the cooperating websites or Relying Parties (RP).
OpenID is much easier to implement than SAML (Security Assertion Markup Language),
SAML does perform the functions more efficient than OpenID.
What is 802.1x?
Standardized framework used for port-based authentication on wired and wireless networks. It is a just a frame work.
It utilizes other mechanisms to do the real authentication such as Remote Authentication Dialing User Service (RADIUS) and Terminal Access Controller Access Control System Plus (TACACS+)
802.1x can prevent rogue devices
What is Extensible Authentication Protocol (EAP) ?
A framework of protocols that allows for numerous methods of authentication including passwords, digital certificates, and public key infrastructure
What is EAP-MD5?
A variant of EAP that uses simple passwords for its challenge-authentication
What is EAP-TLS?
A variant of EAP that uses public key infrastructure, with a digital certificates for mutual authentication
What is EAP-TTLS ?
A variant of EAP that uses a server-side digital certificate and a client-side password for mutual authentication. More secure than the traditional EAP-MD5, but less secure than EAP-TLS