1. Trang chủ
  2. » Công Nghệ Thông Tin

Lecture Data security and encryption - Chapter 22: User authentication

59 32 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Cấu trúc

  • Data Security and Encryption (CSE348)

  • Lecture # 22

  • Review

  • Chapter 15 – User Authentication

  • Slide 5

  • User Authentication

  • Slide 7

  • Slide 8

  • Slide 9

  • Slide 10

  • Slide 11

  • Means of User Authentication

  • Authentication Protocols

  • Slide 14

  • Slide 15

  • Replay Attacks

  • Slide 17

  • Slide 18

  • Slide 19

  • One-Way Authentication

  • Slide 21

  • Slide 22

  • Slide 23

  • Using Symmetric Encryption

  • Needham-Schroeder Protocol

  • Slide 26

  • Slide 27

  • Slide 28

  • Slide 29

  • Slide 30

  • Slide 31

  • Slide 32

  • Slide 33

  • Slide 34

  • Slide 35

  • Slide 36

  • Kerberos

  • Slide 38

  • Slide 39

  • Kerberos Requirements

  • Slide 41

  • Slide 42

  • Slide 43

  • Slide 44

  • Slide 45

  • Slide 46

  • Kerberos v4 Overview

  • Slide 48

  • Kerberos Realms

  • Slide 50

  • Kerberos Version 5

  • Federated Identity Management

  • Slide 53

  • Slide 54

  • Slide 55

  • Slide 56

  • Slide 57

  • Standards Used

  • Summary

Nội dung

The contents of this chapter include all of the following: Remote user authentication issues, authentication using symmetric encryption, the Kerberos trusted key server system, authentication using asymmetric encryption, federated identity management.

Data Security and Encryption (CSE348) Lecture # 22 Review • have considered: – symmetric key distribution using symmetric encryption – symmetric key distribution using public-key encryption – distribution of public keys • announcement, directory, authrority, CA – X.509 authentication and certificates Chapter 15 – User Authentication We cannot enter into alliance with neighboring princes until we are acquainted with their designs —The Art of War, Sun Tzu User Authentication • This chapter examines some of the authentication functions that have been developed to support network-based use authentication • User authentication is the fundamental building block and the primary line of defense • User authentication is the basis for most types of access control and for user accountability User Authentication • RFC 2828 defines user authentication as the process of verifying an identity claimed by or for a system entity • An authentication process consists of two steps: • Identification step • Verification step User Authentication • Identification step: Presenting an identifier to the security system • Identifiers should be assigned carefully • Because authenticated identities are the basis for other security services • Such as access control service User Authentication • Verification step: Presenting or generating authentication information • That corroborates the binding between the entity and the identifier User Authentication • In essence, identification is the means by which a user provides a claimed identity to the system • User authentication is the means of establishing the validity of the claim • User authentication is distinct from message authentication 10 Kerberos Requirements • Transparent: Ideally, the user should not be aware that authentication is taking place • Beyond the requirement to enter a password 45 Kerberos Requirements • Scalable: The system should be capable of supporting large numbers of clients and servers • This suggests a modular, distributed architecture • To support these requirements, Kerberos is a trusted third-party authentication service • That uses a protocol based on that proposed by Needham and Schroeder 46 Kerberos v4 Overview  A basic third-party authentication scheme  Have an Authentication Server (AS)  users initially negotiate with AS to identify self  AS provides a non-corruptible authentication credential (ticket granting ticket TGT) 47 Kerberos v4 Overview  Have a Ticket Granting server (TGS)  users subsequently request access to other services from TGS on basis of users TGT  Using a complex protocol using DES 48 Kerberos Realms • A Kerberos environment consists of: – a Kerberos server – a number of clients, all registered with server – application servers, sharing keys with server • This is termed a realm – typically a single administrative domain • If have multiple realms, their Kerberos servers must share keys and trust 49 Kerberos Realms 50 Kerberos Version • Developed in mid 1990’s • Specified as Internet standard RFC 1510 • Provides improvements over v4 – addresses environmental shortcomings • encryption algo, network protocol, byte order, ticket lifetime, authentication forwarding, interrealm auth – and technical deficiencies • double encryption, non-std mode of use, session keys, password attacks 51 Federated Identity Management • Federated identity management is a relatively new concept • Dealing with the use of a common identity management scheme across multiple enterprises • And numerous applications and supporting many thousands, even millions of users 52 Federated Identity Management • Identity management is a centralized, automated approach • To provide enterprise-wide access to resources by employees and other authorized individuals • Defining an identity for each user (human or process), associating attributes with the identity, and enforcing a means by which a user can verify identity 53 Federated Identity Management • Its principal elements are: • Authentication: confirmating user corresponds to the user name provided • Authorization: granting access to services/resources given user authentication • Accounting: process for logging access and authorization 54 Federated Identity Management • Provisioning: enrollment of users in the system • Workflow automation: movement of data in a business process • Delegated administration: use of role-based access control to grant permissions • Password synchronization: Creating a process for single sign-on (SSO) or reduced sign-on (RSO) 55 Federated Identity Management • Self-service password reset: enable user to modify their password • Federation: process where authentication and permission will be passed on from one system to another • Usually across multiple enterprises, reducing the number of authentications needed by the user • Kerberos contains a number of the elements of an identity management system 56 Federated Identity Management  Use of common identity management scheme  across multiple enterprises & numerous applications  supporting many thousands, even millions of users  Principal elements are:  authentication, authorization, accounting, provisioning, workflow automation, delegated administration, password synchronization, selfservice password reset, federation 57  Kerberos contains many of these elements Standards Used  Security Assertion Markup Language (SAML)  XML-based language for exchange of security information between online business partners  Part of OASIS (Organization for the Advancement of Structured Information Standards) standards for federated identity management  e.g WS-Federation for browser-based federation  Need a few mature industry standards 58 Summary  have considered:  remote user authentication issues  authentication using symmetric encryption  the Kerberos trusted key server system  authentication using asymmetric encryption  federated identity management 59 ... building block and the primary line of defense • User authentication is the basis for most types of access control and for user accountability User Authentication • RFC 2828 defines user authentication. .. available to read it 20 One-Way Authentication • The "envelope" or header of the e-mail message must be in the clear • So that the message can be handled by the store -and- forward e-mail protocol, such... validity of the claim • User authentication is distinct from message authentication 10 User Authentication  Fundamental security building block basis of access control & user accountability 

Ngày đăng: 20/09/2020, 14:02