Internet2 Base CAMP Topics in Middleware: Authentication.

Slides:



Advertisements
Similar presentations
Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi
Advertisements

Lecture 23 Internet Authentication Applications
Authentication & Kerberos
Technical Issues with Establishing Levels of Assurance Zephyr McLaughlin Lead, Security Middleware Computing & Communications University of Washington.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Active Directory: Final Solution to Enterprise System Integration
EUropean Best Information through Regional Outcomes in Diabetes Privacy and Disease Registries Technical Aspects Peter Beck JOANNEUM RESEARCH, Austria.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
 Key exchange o Kerberos o Digital certificates  Certificate authority structure o PGP, hierarchical model  Recovery from exposed keys o Revocation.
May 22, 2002 Joint Operations Group Discussion Overview Describe the UC Davis Security Architecture Describe Authentication Efforts at UC Davis Current.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
Designing Security In Web Applications Andrew Tomkowiak 10/8/2013 UW-Platteville Software Engineering Department
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Masud Hasan Secure Project 1. Secure It uses Digital Certificate combined with S/MIME capable clients to digitally sign and.
Authentication Approaches over Internet Jia Li
Chapter 10: Authentication Guide to Computer Network Security.
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
14.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 14 Entity Authentication.
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
CIS 450 – Network Security Chapter 8 – Password Security.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
SSL, Single Sign On, and External Authentication Presented By Jeff Kelley April 12, 2005.
University Health Care Computer Systems Fellows, Residents, & Interns.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Passwords. Outline Objective Authentication How/Where Passwords are Used Why Password Development is Important Guidelines for Developing Passwords Summary.
Network Security Lecture 23 Presented by: Dr. Munam Ali Shah.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
1 Securing Data and Communication. 2 Module - Securing Data and Communication ♦ Overview Data and communication over public networks like Internet can.
Harshavardhan Achrekar - Grad Student Umass Lowell presents 1 Scenarios Authentication Patterns Direct Authentication v/s Brokered Authentication Kerberos.
Strong Security for Distributed File Systems Group A3 Ka Hou Wong Jahanzeb Faizan Jonathan Sippel.
Operating System Security Fundamentals Dr. Gabriel.
CSCE 522 Identification and Authentication. CSCE Farkas2Reading Reading for this lecture: Required: – Pfleeger: Ch. 4.5, Ch. 4.3 Kerberos – An Introduction.
14.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 14 Entity Authentication.
Ingredients of Information Security. - Who has access the asset? - Is the asset correct? - Is the asset accessible? …uncorrupted? …authentic?
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Encryption. Introduction The incredible growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
1 Kerberos – Private Key System Ahmad Ibrahim. History Cerberus, the hound of Hades, (Kerberos in Greek) Developed at MIT in the mid 1980s Available as.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Access Control / Authenticity Michael Sheppard 11/10/10.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Password Security Module 8. Objectives Explain Authentication and Authorization Provide familiarity with how passwords are used Identify the importance.
User Authentication  fundamental security building block basis of access control & user accountability  is the process of verifying an identity claimed.
CSCE 201 Identification and Authentication Fall 2015.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Security on Peer-to-Peer Networks.
Identity and Access Management
Secure Connected Infrastructure
Chapter One: Mastering the Basics of Security
Grid Security.
Radius, LDAP, Radius used in Authenticating Users
S/MIME T ANANDHAN.
Security Barriers Asset Proper Access Attack Security System
Chapter 7 STRENGTH OF ENCRYPTION & Public Key Infrastructure
Lesson 16-Windows NT Security Issues
Module 2 OBJECTIVE 14: Compare various security mechanisms.
ONLINE SECURE DATA SERVICE
Preparing for the Windows 8. 1 MCSA Module 6: Securing Windows 8
Presentation transcript:

Internet2 Base CAMP Topics in Middleware: Authentication

Introduction  Background  Authentication Defined  Authentication Methods  Password Discussion  Positioning for Single Sign On at MTU

Authentication Defined  Authentic –Conforming to fact and therefore worthy of trust, reliance, or belief –Having a claimed and verifiable origin or authorship; not counterfeit or copied  Authenticate –To establish the authenticity of; prove genuine  Authentication –The verification of the identity of a person or process. In a communication system, authentication verifies that messages really come from their stated source, like the signature on a (paper) letter or a check

Authentication Methods  Challenge-Response  Biometrics  Public Key Infrastructure (PKI)/Digital Certificates  Kerberos  Userid/Password Pairs

Passwords (Cons)  Passwords are “crackable”  Frequently sent over the network in the clear  Too many promote “sticky note” storage

Passwords (Pros)  User friendly –People get the concept (like an ATM pin #) –Technology tends to get in the way with PKI and S/Key  Easy to manage  Supported across platforms

Password Security  Require a minimum password length –“Wider is better”  Require non-alphanumeric text –Increases your password alphabet –Passwords more difficult to crack  Attempt to crack passwords –During password change –Constantly, for all users  Maintain a password history –Attempts to regulate password reuse –Easily circumventable –Creates a list of users passwords (bad)

Password Security Continued  Implement an account lockout mechanism –Attempts to keep real time crackers at bay –Introduces a possible DoS for users  Implement “shared secrets” –Reduces administrative involvement in password resets –Useful in distance education situations  Use photo identification –Online and/or on an ID card

Password Security Continued  Develop a password expiration policy –No password expiration –Passwords expire at regular intervals  Never store a password as plain text –One-way crypt algorithms for password files –Symmetric ciphers for scripts  Maintain audit logs –Useful in tracking violators –Watch out for privacy issues –Watch out for cancerous growth

Password Security Continued  Develop procedures/policies for proper use of privileged accounts –Never send unencrypted –No “sticky note” storage

Positioning for Single Sign On What Michigan Tech Is Doing  Introducing LDAP –Unique userid registry –Unique Identifier –White Pages Non critical system All the person entries in one place

Positioning for Single Sign On Continued  Web Single Sign On –No account information required UUID SID Login Shell Home Directory –No clear text transmission of password –Easy for others to implement –Easy to demonstrate –Reduced Sign On –Pubcookie/WebISO –SAML (Security Assertion Markup Language)

Web Authentication at MTU Authenticate Issue cookie/credential Client Web Application Not Logged In Web authN service

Positioning for Single Sign On Continued  Single Password Issues –Cross platform Difficult to synchronize across platforms –Catch 22 issues Reset password notification –Application issues AuthN capabilities

Positioning for Single Sign On Continued  Central Authentication System Issues –Network issues Availability Load –Central storage issues Reliability Disk Space –Account management issues Who owns which users? Who can change account information?

Positioning for Single Sign On Continued  Reduced account management –No password files / NIS –Delegated administration  Enforceable secure protocols  Standard authN across campus and off campus

Sources  Identifiers, Authentication, and Directories: Best Practices for Higher Education. practices-00.html  The Free On-line Dictionary of Computing, © Denis Howe  The American Heritage® Dictionary of the English Language, Fourth Edition. Copyright © 2000 by Houghton Mifflin Company. Published by Houghton Mifflin Company. All rights reserved.