3.8 Authentication and Authorization Solutions
Authentication Management
hardware-based authentication = physical password key, Yubikey
trusted platform module (TPM) - cryptographic functions
hardware security module (HSM) - high-end cryptographic hardware
knowledge-based authentication (KBA) - use personal knowledge as authentication factor
PAP and CHAP
authentication to a network
password authentication protocol (PAP) = basic auth method used in legacy OSs, sends data in clear text, non-encrypted password exchange
challenge-handshake authentication protocol (CHAP) = encrypted challenge sent over the network - three-way handshake occurs 1. link is established, server sends a challenge message 2. client responds with a password hash calculated from the challenge and the password 3. server compares received hash with stored hash
MS-CHAP = Microsoft's implementation of CHAP - commonly used in point-to-point tunneling protocol (PPTP) - MS-CHAPv2 is not secure anymore, use L2TP, IPsec, 802.1X
Identity and Access Services
RADIUS (remote authentication dial-in user service) - centralized Authentication, Authorization, and Accounting (AAA) management for users who connect and use a network service
TACACS+ (terminal access controller access-control system) - handles remote authentication and related services for networked access control through a centralized server - unlike RADIUS, TACACS+ separates authentication, authorization, and accounting processes, providing more flexibility and control. - TACACS+ encrypts the entire body of the packet, providing greater security for the management of network devices
Kerberos - network authentication protocol designed to provide strong authentication for client/server applications by using secret-key cryptography key components - key distribution center (KDC) = central authority that provides temporary tickets and session keys. KDC has two parts: the Authentication Server (AS) and the Ticket Granting Server (TGS) - tickets = used to authenticate and establish sessions between clients and services - principal = refers to a user or service that can authenticate using Kerberos
802.1X = network access control protocol that provides an authentication mechanism for devices wishing to connect to a LAN or WLAN.
Federated Identities
Establishment of mutual trust between separate IT systems or organizations, enabling them to share resources and data securely
SSO (single sign-on) = allowing users to log in once and gain access to multiple systems without the need for multiple logins. - common standards used in federation include SAML (Security Assertion Markup Language), OAuth, and OpenID Connect, which facilitate secure information exchange for authentication and authorization.
Access Control
Authorization - process of ensuring only authorized rights are exercised
Mandatory Access Control (MAC) - operating system limits the operation on an object, based on security clearance levels - strict security model in which access rights and permissions are assigned based on regulations and policies established by a central authority - access to resource objects (like files and directories) is determined by settings configured by the system administrator and based on the user’s clearance level, as well as the classification of the information
Discretionary Access Control (DAC) - owners or creators of files, programs, or other resources have the authority to decide who can access those resources and what permissions they have - more flexibility than MAC, as permissions can be changed by the resource owner rather than requiring administrative intervention - like Google Docs
Role-based access control (RBAC) - an approach to restricting system access to authorized users based on their role within an organization - users are assigned roles, and those roles are then granted permissions to perform certain operations - can be seen as a type of MAC if roles are assigned with central authority and cannot be changed by users - like AWS services roles
Attribute-based access control (ABAC) - access decisions are based on attributes. these attributes can be related to the user (such as department or role), the resource (like the classification of the data), the action (like read or write), and the contextual (such as time of day or location)
Rule-based access control (RuBAC) - the system administrator defines the rules that govern access to resource objects. access decisions are typically based on conditions set within the rules, such as time-of-day restrictions, the state of the system, or the location of the user or resource
Privileged access management (PAM) - refers to the strategies and technologies used to control and monitor the access and activities of privileged users — those with administrative or special access to critical systems and data
Account Management: Includes managing the lifecycle of privileged accounts, ensuring that privileges are granted according to need and revoked when no longer necessary.
Session Monitoring and Recording: Often includes the ability to monitor and record sessions for auditing and forensics.
Credential Protection: Involves securing credentials for privileged accounts, often through vaults or other secure storage mechanisms, and frequently involves rotating passwords.
Last updated
Was this helpful?