 Authentication o Something you know (password) o Something you have (smartcard) o Something about you (iris scan)  Password authentication o To protect.

Slides:



Advertisements
Similar presentations
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Advertisements

Akshat Sharma Samarth Shah
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Access Control Chapter 3 Part 3 Pages 209 to 227.
Key Exchange – Diffie-Hellman – Symmetric crypto (KDC idea, Needham-Shroeder, Kerberos) – Asymmetric crypto – certificates Stolen keys recovery Group keys.
Access Control Methodologies
Lecture 23 Internet Authentication Applications
Authentication & Kerberos
1 Security Assertion Markup Language (SAML). 2 SAML Goals Create trusted security statements –Example: Bill’s address is and he was authenticated.
Grid Security. Typical Grid Scenario Users Resources.
Chapter 2.  CIA Model  Host Security VS Network Security  Least Privileges  Layered Security  Access Controls Prepared by Mohammed Saher2.
Identity Management Realities in Higher Education NET Quarterly Meeting January 12, 2005.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
T Network Application Frameworks and XML Service Federation Sasu Tarkoma.
 Single sign-on o Centralized and federated passport o Federated Liberty Alliance and Shibboleth  Authorization o Who can access which resource o ACM.
 Key exchange o Kerberos o Digital certificates  Certificate authority structure o PGP, hierarchical model  Recovery from exposed keys o Revocation.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
Authorization. Authorization: Two Meanings Determining permission Is principal P permitted to perform action A on object U? Adding permission P is now.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
SE571 Security in Computing
7-Access Control Fundamentals Dr. John P. Abraham Professor UTPA.
Authorization and Policy. Is principal P permitted to perform action A on object O? – Authorization system will provide yes/no answer Authorization.
Key Management. Shared Key Exchange Problem How do Alice and Bob exchange a shared secret? Offline – Doesn’t scale Using public key cryptography (possible)
Cookies COEN 351 E-commerce Security. Client / Session Identification HTTP does not maintain state. State Information can be passed using: HTTP Headers.
Authentication and Identity Management. Ideally – Who you are Practically – Something you know (e.g., password) – Something you have (e.g., badge) – Something.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Session 11: Security with ASP.NET
Identity Management Report By Jean Carreon and Marlon Gonzales.
Authenticating Users Chapter 6. Learning Objectives Understand why authentication is a critical aspect of network security Describe why firewalls authenticate.
© FPT SOFTWARE – TRAINING MATERIAL – Internal use 04e-BM/NS/HDCV/FSOFT v2/3 Securing a Microsoft ASP.NET Web Application.
Kerberos: An Authentication Service for Open Network Systems Jennifer G. Steiner Clifford Neuman Jeffrey I. Schiller.
SSL, Single Sign On, and External Authentication Presented By Jeff Kelley April 12, 2005.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.
10.1 Silberschatz, Galvin and Gagne ©2005 Operating System Principles 10.4 File System Mounting A file system must be mounted before it can be accessed.
Access Control. What is Access Control? The ability to allow only authorized users, programs or processes system or resource access The ability to disallow.
CSCE 522 Identification and Authentication. CSCE Farkas2Reading Reading for this lecture: Required: – Pfleeger: Ch. 4.5, Ch. 4.3 Kerberos – An Introduction.
Cookies and Sessions IDIA 618 Fall 2014 Bridget M. Blodgett.
Claims-Based Identity Solution Architect Briefing zoli.herczeg.ro Taken from David Chappel’s work at TechEd Berlin 2009.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
MEMBERSHIP AND IDENTITY Active server pages (ASP.NET) 1 Chapter-4.
Key Management. Shared Key Exchange Problem How do Alice and Bob exchange a shared secret? Offline – Doesn’t scale Using public key cryptography (possible)
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 7 Authentication Methods and Requirements.
WEB SERVER SOFTWARE FEATURE SETS
Access Control: Policies and Mechanisms Vinod Ganapathy.
Privilege Management Chapter 22.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
User Authentication  fundamental security building block basis of access control & user accountability  is the process of verifying an identity claimed.
Dos and Don’ts of Client Authentication on the Web Kevin Fu, Emil Sit, Kendra Smith, Nick Feamster Presented: Jesus F. Morales.
Rights Management for Shared Collections Storage Resource Broker Reagan W. Moore
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
Access Control Model SAM-5.
Chapter One: Mastering the Basics of Security
Federation made simple
Key Management.
Radius, LDAP, Radius used in Authenticating Users
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
Operating Systems Security
CS703 - Advanced Operating Systems
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

 Authentication o Something you know (password) o Something you have (smartcard) o Something about you (iris scan)  Password authentication o To protect from server compromise, store one- way hash at the server o To protect from dictionary attack use random, long salt o To protect from sniffing use Lamport hash or use asymmetric crypto instead of a password  Single sign-on

 Placed into browser cache by servers to store state about this particular user o Contain any information that server wants to remember about the user as name/value pairs o May contain expiration time o May persist across browser instances  Returned to server in clear on new access  Only those cookies created for the server’s domain are sent to the server o May not be created by this server  Usually used for persistent sign in, shopping cart, user preferences

 User logs in using her user/pass o Server sets a cookie with some info – username, password, session ID … o Any future accesses return this info to the server who uses it for authentication (equivalent to user/pass) o Once user signs out the cookie is deleted and the session closed at the server  Problems o Cookies can be sniffed, remain on the browser because user did not sign out, be stolen by cross-site scripting or via DNS poisoning  Solutions: o Send cookies over SSL, use timed cookies, secure code, bind cookies to IP address of the client, encrypt cookies … Learn more at:

 Passport  Liberty Alliance  Shibboleth

 Two versions of Passport o Centralized and federated  Liberty Alliance o Loosely federated with framework to describe authentication provided by others

 Goal is single sign-on o Solves problem of weak or repeated user/pass combinations  Implemented via redirections o Users authenticate themselves to a common server, which gives them tickets o Similar flavor to Kerberos but different environment – many organizations  Widely deployed by Microsoft o Designed to use existing technologies in servers/browsers (HTTP redirect, SSL, cookies, Javascript)

 Client (browser), merchant (Web server), Passport login server  Passport server maintains authentication info for client o Gives merchant access when permitted by client  Divides client data into profile (address) and wallet (credit card) David P. Kormann and Aviel D. Rubin, Risks of the Passport Single Signon Protocol, Computer Networks, Elsevier Science Press, volume 33, pages 51-58, 2000.

David P. Kormann and Aviel D. Rubin, Risks of the Passport Single Signon Protocol, Computer Networks, Elsevier Science Press, volume 33, pages 51-58, SSL Token = 3DES encrypted authentication info using key merchant shares with passport server Also set cookie at browser

 User interface is confusing and may misrepresent the reality  Weak keys may be used for 3DES  Single key is used to encrypt cookies for all clients  Cookies stay on machine, can be stolen o No authenticator (timestamp), like in Kerberos, enables reuse by others  Coupling of Hotmail with Passport David P. Kormann and Aviel D. Rubin, Risks of the Passport Single Signon Protocol, Computer Networks, Elsevier Science Press, volume 33, pages 51-58, Read more at

 Multiple federated identity providers o E.g. ISPs register own users o One can rely on claims made by other ID providers  Claims o s, relationships, authorization for scenarios, ownership of private/public key pair  Need “translators” for different claim languages

 Design criteria was most of the issues addressed by Federated Passport, i.e. no central authority  Use SAML (Security Association Markup Language) to describe trust across authorities, and what assertions mean from particular authorities  Four assurance levels o How much we trust a given identity assertion o Little, some, high and very high confidence

 Service Provider o Browser goes to Resource Manager who uses WAYF, and user’s Attribute Requester, and decides whether to grant access.  “Where are you from” (WAYF) service o Redirects to correct servers  Federation to form trusted relationships between providers

6. I know you now. Redirect to SP, with a handle for user 8. Based on attribute values, allow access to resource Identity Provider (IdP) Web Site Service Provider (SP) Web Site 1. User requests resource 2. I don’t know you, or where you are from LDAP WAYF 3. Where are you from? 4. Redirect to IdP for your org 5. I don’t know you. Authenticate using your org’s web login I don’t know your attributes. Ask the IdP (peer to peer) 6 Client Web Browser 8 Source: Kathryn Huxtable 10 June

 Common API for client-server authentication  Standard interface for choosing among authentication methods o Once an application uses GSS-API, it can be changed to use a different authentication method easily  No code rewriting required  Dominant implementation is Kerberos o Some procedure calls  Acquire and release credentials  Manage security context  Init, accept, and process tokens (challenges)  Wrap and unwrap (encrypt/decrypt)

 Brute force  Dictionary  Guessing  Finding elsewhere

 Cards o Mag stripe (= password) o Smart card, USB key o Time-varying password  Issues o How to validate o How to read (i.e. infrastructure)

 Biometrics o Measures some physical attribute  Iris scan  Fingerprint  Picture  Voice  Issues o How to prevent spoofing  Suited when biometric device is trusted, not suited otherwise

 IP Address  Caller ID (or call back)  Past transaction information o Example of something you know

 Require at least two of the classes we mentioned, e.g. o Smart card plus PIN o RSA SecurID plus password o Biometric and password

 Determining permission o Is principal P permitted to perform action A on object U?  Adding permission o P is permitted to perform action A on object U  In this course, we use the first definition

 Who is permitted to perform which actions on what objects?  Access Control Matrix (ACM) o Columns indexed by principal o Rows indexed by objects o Elements are arrays of permissions indexed by action  In practice, ACMs are abstract objects o Huge and sparse o Possibly distributed

File/UserTomDickHarry Readme.txtread read, write passwordswrite Term.exeread, write, execute

 Access Control Lists (ACLs) o For each object, list principals and actions permitted on that object o Corresponds to rows of ACM File/User Readme.txtTom: read, Dick: read, Harry: read, write passwordsHarry: write Term.exeTom: read, write, execute

 Capabilities o For each principal, list objects and actions permitted for that principal o Corresponds to columns of ACM  The Unix file system is an example of…? User TomReadme.txt: read, Term.exe: read, write, execute DickReadme.txt: read HarryReadme.txt: read, write; passwords: write

 Permissions may need to be determined dynamically o Time o System load o Relationship with other objects o Security status of host  Distributed nature of systems may aggravate this o ACLs need to be replicated or centralized o Capabilities don’t, but they’re harder to revoke

 Discretionary o Owners control access to objects o Access permissions based on identity of subject/object o E.g., access to health information  Mandatory o System controls access to objects via rules o E.g., doctors can read files of their own patients  Originator-controlled o Creator controls access to objects, not the owner o E.g., owner can listen to a song but not share it

 Final goal of security o Determine whether to allow an operation  Depends upon o Policy o Authentication o Other characteristics

 Policy defines what is allowed and how the system and security mechanisms should act  Policy is enforced by mechanism which interprets it, e.g. o Firewalls o IDS o Access control lists  Implemented as o Software (which must be implemented correctly and without vulnerabilities)

 Focuses on controlled access to classified information and on confidentiality o No concern about integrity  The model is a formal state transition model of computer security policy o Describes a set of access control rules which use security classification on objects and clearances for subjects  To determine if a subject can access an object o Combine mandatory and discretionary AC (ACM) o Compare object’s classification with subject’s clearance (Top Secret, Secret, Confid., Unclass.) o Allow access if ACM and level check say it’s OK

 Three security properties: o Simple Security Property - a subject at a given security level may not read an object at a higher security level (no read-up) o Star Property - a subject at a given security level must not write to any object at a lower security level (no write-down). Strong Star Property – only write to same level o The Discretionary Security Property - discretionary access control specified via an access control matrix  Trusted subjects - no star property rule o Transfer info from high clearance to low clearance

 Ability to access objects depends on one’s role in the organization  Roles of a user can change o Restrictions may limit holding multiple roles simultaneously or within a session, or over longer periods. o Supports separation of roles  Maps to organization structure

 Like Bell-LaPadula but speaks about integrity  Cannot write to higher-level objects  Subject’s integrity drops if it reads a lower- level object  A subject can only execute subjects at a lower integrity level

 Due midnight  Check the Web page for the paper template o Either use this template or make sure you have same pieces of information in your submission