user authentication

24
User Authentication

Upload: karl

Post on 19-Feb-2016

26 views

Category:

Documents


0 download

DESCRIPTION

User Authentication. Overview. Means of Authentication. Something the individual: Knows Password, Pin, answer to questions Possesses Keycards, smart cards, physical keys Is (static biometric) Fingerprints, retina(iris), face Does (dynamic biometrics) Voice, handwriting,typing rhythm. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: User Authentication

User Authentication

Page 2: User Authentication

Overview

Page 3: User Authentication

Means of Authentication

• Something the individual:• Knows

• Password, Pin, answer to questions

• Possesses• Keycards, smart cards, physical keys

• Is (static biometric)• Fingerprints, retina(iris), face

• Does (dynamic biometrics)• Voice, handwriting,typing rhythm

Page 4: User Authentication

Password

• ‘Normal ‘• Hashed password

• Using salt

• Shadow password file

• Token based password• Often combined with cards / PINs etc

Page 5: User Authentication

Hashed password

Page 6: User Authentication

Password using salt

Page 7: User Authentication

Some Password Attacks• Offline dictionary attack

• Distr.Password-cracking, OPHcrack• Need the passwordfile (<> access control to file)

• Specific account attack• Need a userid (<> # trials)

• Popular password attack• Need userID(s) (<> non trivial passwords)

• Password guessing against one user• Need knowlegde of a user (<> non trivial passwords)

• Computer hijacking• Need physical acces to a foreign computer (<> timeout lockout)

• Exploiting user mistakes • Need user mistaks like password on ‘postITs’

Page 8: User Authentication

Password choices

Page 9: User Authentication

Control passwords

• User education• Computer generated• Reactive password checking• Proactive password checking

• Size, Characters, dictionary

Page 10: User Authentication

Biometrics

• Faced problems– Positive, Negative– False Positive, False Negative

Page 11: User Authentication
Page 12: User Authentication

Access control

Page 13: User Authentication

Access Control Policies

• Discretionary Access control (DAC)• User <-> ressource (linux/unix)

• Mandatory Access control (MAC)• User level <-> ressource level (millitary)

• Role-Based Access control (RBAC)• Users role <-> ressource (windows)

Page 14: User Authentication

DAC

Page 15: User Authentication

Example Unix classic

Page 16: User Authentication

RBAC

Page 17: User Authentication

RBAC cont

Page 18: User Authentication

Windows Active Directory

• The windows X.500 (directory service)• Same information structures as DNS

• E.g. tree – laerer.rhs.dk

• Integrated with windows domain concepts• Primary doamin server, Backup domain servers

• Domain = tree of information• Several domains = forest

• Activating: Normally part of installation• When install windows server – asked to install domain

(i.e. also define SoA of DNS (=tree root))

Page 19: User Authentication

Example

Figure 1.10 Distinguished Name for the User Object JSmith

 Note

Page 20: User Authentication

Users and groups (for RBAC)

• Users are created – lots of attributes / information possible to added

• Create groups – less attributes• Mostly members etc.• Consider type of group

– Universal group – logical (spanning the forest)– Global group – logical (spanning one domain)– Domain Local group (for physical access control)

Page 21: User Authentication

User create

Page 22: User Authentication

Different groups

Page 23: User Authentication

New user - passwords

Page 24: User Authentication

Access rights