Authentication Protocols Natalie DeKoker, Lindsay Haley, Jordan Lunda, Matty Ott
Protocols and Security Point-to-Point Protocol (PPP) Direct Connection Between Two Computers Authenticates, Encrypts, Compresses Network Control Protocol Runs Atop PPP and negotiates options for PPP
Protocols Password Authentication Protocol (PAP) Uses Password to validate Users MS-CHAP Microsoft’s Authentication Protocol for Virtual Private Networks
Security Security (AAA) Authentication, Authorization, and Accounting (AAA) Dictates which users have access or control over parts of the network
RADIUS Remote Authentication Dial-In User Service (RADIUS) The more common between the AAA standards 3 devices: Radius Server, Network Access Servers (NASs), and group of systems that dial into the network Internet Authentication Service (IAS) most common built in with most Windows Server operating systems FreeRADIUS UNIX/LINUX
TACACS+ Terminal Access Controller Access Control System Plus
Kerberos Key Distribution Center (KDC) Authentication Server (AS) Ticket-Granting Service Ticket-Granting Ticket (TGT) 2:15 PM Expires 12:15 AM lcelin1 geauxtigers lsaceldsainasdf1 gjhyeaubsfxtishjgeascrs 2:15 PM
Kerberos Key Distribution Center (KDC) Authentication Server (AS) Ticket-Granting Service Ticket-Granting Ticket (TGT) 2:15 PM
Kerberos - Strengths Time stamping forces new token requests Prevents 3 rd Parties from intercepting tokens Tokens not likely to be cracked within time span
Kerberos - Weaknesses If KDC goes down, no one has access Important to maintain backup Time stamping requires clients to have synchronized clocks
EAP Extensible Authentication Protocol (EAP) EAP-PSK
EAP EAP-TLS (Transport Layer Security) and EAP-MS-CHAP
EAP EAP-TTLS and EAP-MS-CHAPv2 Protected Extensible Authentication Protocol (PEAP)
EAP EAP-MD5 Fizzy Lifting Drinks 02a5c67f32b91ccfea Fizzy Lifting Drinks
EAP Lightweight Extensible Authentication Protocol (LEAP)
802.1x My Computer AuthenticatorAuthentication Server Port-Base Network Access Control (PNAC)
The End