28.2 C
Friday, February 23, 2024
Trivest Technologies
Logical Access Control

Simple Guidance For You In Authentication

Authentication is the process of giving access to authorized users and denying access to unauthorized users for a particular resource on a server. This might involve the use of a document, password or bio metric details, the user needs to identify him or herself before they are given access. Authentication is a protocol under Logical Access Control Systems and the authentication controls can be embedded within operating systems, applications, add-on security packages, database and telecommunication management systems.

Types Of Authentication

The most frequently used type of authentication are;

  • Single Factor Authentication
  • Two Factor Authentication
  • Multi-Factor Authentication
  • Strong Authentication

Single Factor Authentication

This is the process of authorizing a user with only one out of the three categories of credentials. It is the weakest form of authentication which is used by most systems.

Two Factor Authentication

This is the process of authorizing a user or group of users with two layers of security, could be a password and a token or a pin and a one time password. This provides a high level of security which is needed by financial institutions and e-commerce systems.

Multi-Factor Authentication

Multi-Factor authentication is an extra layer of security included in the two-layer security to enhance the security of a transaction.

Strong Authentication

This is the use of several categories of authentication factors to confirm the identity of a user during a transaction.

Authentication Servers

  • RADIUS (Remote Authentication Dial-In User Service)
  • LDAP (Lightweight Directory Access Protocol)
  • TACACS+ (Terminal Access Controller Access Control System)
  • Windows (For stateful NTLM authentication)

Authentication Protocols

  • Kerberos Authentication Protocol
  • NT LAN Manager (NTLM) authentication protocol
  • Secure Sockets Layer/Transport Security Layer (SSL/TLS)
  • Digest authentication

Kerberos Authentication Protocol

Kerberos version 5 is the default authentication protocol for windows server 2003, the Kerberos is derived from Greek mythology (three-headed dog) because of its three components which are

  • The Identity of network users.
  • A server on which clients request services.
  • A computer which both clients and server trust. Kerberos does not transmit passwords during the authentication process. This is typically a Windows Server 2003 domain controller on which the Key Distribution Center service is running.

The Kerberos Protocol is required when you need to;

  • Accept a clients request for authentication.
  • Verify the services the user is trying to request is valid.

NT LAN Manager Authentication

The NT Lan Manager Authentication Protocol is the main authentication type used to enable network authentication for versions of Windows earlier than Windows 2000 such as Windows NT 4. This protocol is used for authentication of all machines between Windows 2000 and Windows NT.

Secure Socket Layer/ Transport Layer Security (SSL/TLS)

Secure Socket Layer is a Windows 2003 server security protocol which utilizes public key technology to provide a secure channel for applications communication of a non-secure network such as the internet.

The SSL works on the OSI Layer and provide encryption/decryption for the following protocols;

  • HTTP
  • LDAP
  • IMAP

The SSL protocol makes it possible to;

  • Verify if the server a user is communicating is the actual server and not an intercept.
  • Enables the server to verify the user’s identity.
  • Ensures data confidentiality between the server and the user.

Digest Authentication

Digest Authentication is used to authenticate web applications running Internet Information Services. The Digest Access protocol employs challenge-response mechanisms for applications using HTTP or Simple Authentication Security Layers Communication (SASL).

Trivestgroup is a Nigerian Security Company specialized in Authentication servers and protocols suitable for all organizations. Contact trivestgroup on +234-802-230-6494 or forward a mail to contact@trivestgroup.com for your security risk assessment today.

Related posts

How to Secure Your Office Environment With a Checklist

Deji Adekeye

Types Of Business With Their Specific Security Needs

Deji Adekeye

Physical And Logical Access Control: Understanding The Differences

Deji Adekeye

Leave a Comment