Internet2 Base CAMP Topics in Middleware: Authentication.

17
Internet2 Base CAMP Topics in Middleware: Authentication

description

Authentication Defined  Authentic –Conforming to fact and therefore worthy of trust, reliance, or belief –Having a claimed and verifiable origin or authorship; not counterfeit or copied  Authenticate –To establish the authenticity of; prove genuine  Authentication –The verification of the identity of a person or process. In a communication system, authentication verifies that messages really come from their stated source, like the signature on a (paper) letter or a check

Transcript of Internet2 Base CAMP Topics in Middleware: Authentication.

Page 1: Internet2 Base CAMP Topics in Middleware: Authentication.

Internet2 Base CAMPTopics in Middleware:

Authentication

Page 2: Internet2 Base CAMP Topics in Middleware: Authentication.

Introduction Background Authentication Defined Authentication Methods Password Discussion Positioning for Single Sign On at MTU

Page 3: Internet2 Base CAMP Topics in Middleware: Authentication.

Authentication Defined Authentic

– Conforming to fact and therefore worthy of trust, reliance, or belief

– Having a claimed and verifiable origin or authorship; not counterfeit or copied

Authenticate– To establish the authenticity of; prove genuine

Authentication– The verification of the identity of a person or process. In a

communication system, authentication verifies that messages really come from their stated source, like the signature on a (paper) letter or a check

Page 4: Internet2 Base CAMP Topics in Middleware: Authentication.

Authentication Methods Challenge-Response Biometrics Public Key Infrastructure (PKI)/Digital

Certificates Kerberos Userid/Password Pairs

Page 5: Internet2 Base CAMP Topics in Middleware: Authentication.

Passwords (Cons) Passwords are “crackable” Frequently sent over the network in the

clear Too many promote “sticky note” storage

Page 6: Internet2 Base CAMP Topics in Middleware: Authentication.

Passwords (Pros) User friendly

– People get the concept (like an ATM pin #)– Technology tends to get in the way with PKI

and S/Key Easy to manage Supported across platforms

Page 7: Internet2 Base CAMP Topics in Middleware: Authentication.

Password Security Require a minimum password length

– “Wider is better” Require non-alphanumeric text

– Increases your password alphabet– Passwords more difficult to crack

Attempt to crack passwords– During password change– Constantly, for all users

Maintain a password history– Attempts to regulate password reuse– Easily circumventable– Creates a list of users passwords (bad)

Page 8: Internet2 Base CAMP Topics in Middleware: Authentication.

Password Security Continued Implement an account lockout mechanism

– Attempts to keep real time crackers at bay– Introduces a possible DoS for users

Implement “shared secrets”– Reduces administrative involvement in

password resets– Useful in distance education situations

Use photo identification– Online and/or on an ID card

Page 9: Internet2 Base CAMP Topics in Middleware: Authentication.

Password Security Continued Develop a password expiration policy

– No password expiration– Passwords expire at regular intervals

Never store a password as plain text– One-way crypt algorithms for password files– Symmetric ciphers for scripts

Maintain audit logs– Useful in tracking violators– Watch out for privacy issues– Watch out for cancerous growth

Page 10: Internet2 Base CAMP Topics in Middleware: Authentication.

Password Security Continued Develop procedures/policies for proper use

of privileged accounts– Never send unencrypted– No “sticky note” storage

Page 11: Internet2 Base CAMP Topics in Middleware: Authentication.

Positioning for Single Sign OnWhat Michigan Tech Is Doing Introducing LDAP

– Unique userid registry– Unique Identifier– White Pages

• Non critical system• All the person entries in one place

Page 12: Internet2 Base CAMP Topics in Middleware: Authentication.

Positioning for Single Sign On Continued Web Single Sign On

– No account information required• UUID• SID• Login Shell• Home Directory

– No clear text transmission of password– Easy for others to implement– Easy to demonstrate– Reduced Sign On– Pubcookie/WebISO– SAML (Security Assertion Markup Language)

Page 13: Internet2 Base CAMP Topics in Middleware: Authentication.

Web Authentication at MTU

Authenticate

Issue cookie/credential

Client

Web Application

Not Logged

In

Web authN service

Page 14: Internet2 Base CAMP Topics in Middleware: Authentication.

Positioning for Single Sign On Continued Single Password Issues

– Cross platform• Difficult to synchronize across platforms

– Catch 22 issues• Reset password notification

– Application issues• AuthN capabilities

Page 15: Internet2 Base CAMP Topics in Middleware: Authentication.

Positioning for Single Sign On Continued Central Authentication System Issues

– Network issues• Availability• Load

– Central storage issues• Reliability• Disk Space

– Account management issues• Who owns which users?• Who can change account information?

Page 16: Internet2 Base CAMP Topics in Middleware: Authentication.

Positioning for Single Sign On Continued Reduced account management

– No password files / NIS– Delegated administration

Enforceable secure protocols Standard authN across campus and off

campus

Page 17: Internet2 Base CAMP Topics in Middleware: Authentication.

Sources Identifiers, Authentication, and Directories: Best

Practices for Higher Education.http://middleware.internet2.edu/internet2-mi-best-practices-00.html

The Free On-line Dictionary of Computing, © 1993-2001 Denis Howe

The American Heritage® Dictionary of the English Language, Fourth Edition.Copyright © 2000 by Houghton Mifflin Company. Published by Houghton Mifflin Company. All rights reserved.