Presentation is loading. Please wait.

Presentation is loading. Please wait.

Authentication Protocols Natalie DeKoker, Lindsay Haley, Jordan Lunda, Matty Ott.

Similar presentations


Presentation on theme: "Authentication Protocols Natalie DeKoker, Lindsay Haley, Jordan Lunda, Matty Ott."— Presentation transcript:

1 Authentication Protocols Natalie DeKoker, Lindsay Haley, Jordan Lunda, Matty Ott

2 Protocols and Security Point-to-Point Protocol (PPP) Direct Connection Between Two Computers Authenticates, Encrypts, Compresses Network Control Protocol Runs Atop PPP and negotiates options for PPP

3 Protocols Password Authentication Protocol (PAP) Uses Password to validate Users MS-CHAP Microsoft’s Authentication Protocol for Virtual Private Networks

4 Security Security (AAA) Authentication, Authorization, and Accounting (AAA) Dictates which users have access or control over parts of the network

5 RADIUS Remote Authentication Dial-In User Service (RADIUS) The more common between the AAA standards 3 devices: Radius Server, Network Access Servers (NASs), and group of systems that dial into the network Internet Authentication Service (IAS) most common built in with most Windows Server operating systems FreeRADIUS UNIX/LINUX

6 TACACS+ Terminal Access Controller Access Control System Plus

7

8 Kerberos Key Distribution Center (KDC) Authentication Server (AS) Ticket-Granting Service Ticket-Granting Ticket (TGT) 2:15 PM Expires 12:15 AM lcelin1 geauxtigers lsaceldsainasdf1 gjhyeaubsfxtishjgeascrs 2:15 PM

9 Kerberos Key Distribution Center (KDC) Authentication Server (AS) Ticket-Granting Service Ticket-Granting Ticket (TGT) 2:15 PM

10 Kerberos - Strengths Time stamping forces new token requests Prevents 3 rd Parties from intercepting tokens Tokens not likely to be cracked within time span

11 Kerberos - Weaknesses If KDC goes down, no one has access Important to maintain backup Time stamping requires clients to have synchronized clocks

12 EAP Extensible Authentication Protocol (EAP) EAP-PSK

13 EAP EAP-TLS (Transport Layer Security) and EAP-MS-CHAP

14 EAP EAP-TTLS and EAP-MS-CHAPv2 Protected Extensible Authentication Protocol (PEAP)

15

16 EAP EAP-MD5 Fizzy Lifting Drinks 02a5c67f32b91ccfea Fizzy Lifting Drinks

17 EAP Lightweight Extensible Authentication Protocol (LEAP)

18 802.1x My Computer AuthenticatorAuthentication Server Port-Base Network Access Control (PNAC)

19 The End


Download ppt "Authentication Protocols Natalie DeKoker, Lindsay Haley, Jordan Lunda, Matty Ott."

Similar presentations


Ads by Google