Security+ SY0-601: 2.4: Authentication and Authorization

This entry is part 17 of 47 in the series [ Security+ SY0-601 ]

Chapter 12: Authentication and Authorization

Authentication Methods

Here’s a PM video that looks at this topic from the 601 objectives, in this case objective 2.4:

Windows Authentication

LM – MS DOS and Windows for Workgroups; very weak hashing

NTLM – Windows NT domains, which are NOT directories and which preceded directories; better hashing

NTLMv2 <– This is the best protocol to use if you’re not using AD, because of much stronger hashing

Kerberos – AD’s Single Sign-on protocol, used in directory services. Here’s a PM video from the Security+ 501 that explains Kerberos as a separate topic. The 601 merges this topic into the general Authentication topic (see below).

  Directory Services

LDAP (X.500)

X.500 is the formal name for Directory Access Protocol, or DAP. This was developed my the DoD and shared with the open-source community via a Freedom of Information Act request, becoming LDAP, or Lightweight DAP. And LDAP consists of:

Key Distribution Center

Authentication Service

Ticket Granting Service

Notice that Certificates are part of this protocol, and are defined as X.509 documents.

Federation

This concept has to do with users. Two or more organizations can consolidate authentication, with lots of tough choices as to how much trust to give.

When you “Sign on with Facebook” or any other social media service, that’s a form of federation.

Attestation

This concept has to do with devices. Are they part of your organization, are they trusted, and how much?

Technologies

TOTP – Time-based one-
time password

 HOTP – HMAC-based one-time
password

SMS: Short message service

Token key

Static codes

Authentication applications

Push notifications

Phone call

Smart card authentication

Biometrics

Fingerprint

Retina

Iris

Facial

Voice

Vein

Gait analysis

Efficacy rates

False acceptance

False rejection

Crossover error rate

Info
See our textbook, pp. 196-198, for a visual explanation of the three concepts above.

MFA: Multifactor Authentication Factors and Attributes

Factors

Something you know

Something you have

Something you are

Attributes

Somewhere you are

Something you can do

Something you exhibit

Someone you know

Identity and Access Control: AAA: Authentication, Authorization, and Accounting

PAP

CHAP

MSCHAPv2

RADIUS – Microsoft’s favorite protocol for remote access and authentication. It runs on a server.

TACACS+ – Terminal Access Controller / Access Control System Plus is a Cisco protocol similar to RADIUS. It’s a remote-access protocol that gives you pass-through to an internal authentication server, like AD.

Cloud vs. on-premises requirements

Cloud Authentication

https://docs.aws.amazon.com/IAM/latest/UserGuide/introduction.html

Series Navigation<< Security+ SY0-601: 2.3: Secure Application Development, Deployment and AutomationSecurity+ SY0-601: 2.5: Implementing Cybersecurity Resilience >>