AAA-Arch Authentication Schemes Stephen Farrell stephen.farrell@baltimore.ie John Vollbrecht jrv@interlinknetworks.com Joe Salowey joes@wrq.com Standish Stewart sstewart@interlinknetworks.com
What we’re doing Starting work... Similar to what we did with authorization Analyse authentication schemes no invention though! Figure out some models Match those with the authorization models
Factors Communications paths (topology) Establishes shared secrets or not Requires time synchronisation or not Mutual authentication or not Type of pre-established data (root info, biometrics, shared-secrets) Allows impersonation or not
User -> Auth. Server AS User Application
App. -> Auth. Server AS User Application
Triangle? AS User Application