-
AAA
-
Authentication:
- The process that determines whether a principal (an entity to be authenticated) is a legitimate system user.
-
Authorization:
- The process that determines what an authenticated principal is privileged to do on the network.
-
Accounting:
- The process of monitoring and recording (logging) a principal's use of the network.
-
AAA also refers to a family of three protocols used to perform remote authentication services:
- RADIUS
- Diameter
- TACACS+
-
Authentication Models
-
Identity Proofing
- Also known as Identity Management
- The processes used to establish the uniqueness and validity of an individual's identity, to facilitate the provision of an entitlement or service.
- This process may rely upon factors such as identity documents, biographic information, biometric information, and knowledge of personally relevant information or events.
-
Factor-Based Authentication Methods
-
Authentication by Knowledge:
- Something the user knows
-
Examples
- Password
- PIN
- Security Question
- Associated with Knowledge Factor authentication methods.
- Considered the weakest (least secure).
-
Authentication by Ownership:
- Something the user owns
-
Examples
- Security Token
- Dongle
- Security Card
- RFID Chip
- Associated with Possession Factor authentication methods.
-
Authentication by Characteristic:
- Something the user is or does
-
Examples
- Retina Scan
- Fingerprint
- Voice
- Written Signature
- Keystroke Pattern
- Associated with Inheritance Factor authentication methods.
-
Multifactor Authentication (MFA):
- An authentication model that requires two or more independent factors to verify an identity.
-
Multifactor authentication includes at least two of the following three factors:
- Knowledge Factor Authentication
- Possession Factor Authentication
- Inheritance Factor Authentication
-
Derived (Dependent) Authentication Methods
-
Transaction Authentication:
- An authentication model that seeks out reasonable mistakes when comparing known data about a user with the details of a current transaction.
-
This information could include:
- Unfamiliar IP Address
- Large Purchases
- Unfamiliar Purchase History
- Multiple Incorrect PIN Attempts
-
Context-Based Authentication or Context-Aware Authentication:
- An authentication model that balances trust against risk by letting you implement simple policies to allow (or deny) access to web applications based on contextual information - such as user role, group membership, device usage, location (IP address) and geographical location.
-
Context-based authentication dynamically adapts to context changes to:
- Restrict access to high-risk applications that contain sensitive data to known office locations or to specific IP addresses (in the case of remote users)
- Limit access to applications to approved or trusted devices
- Require users to authenticate using 2-factor authentication (2FA) to access certain applications
-
Mutual Authentication or Out-of-Band (OOB) Authentication:
- An authentication model that requires multiple channels to authenticate.
- For example, a large money transfer would generate a phone call, text, email, or app notification that must receive a response within a certain window of time, or else the transaction is denied and all current sessions are logged out.
-
SSO
-
Single Sign-On (SSO):
- An authentication method in which a user authenticates to an authentication server, also called an SSO server.
- The SSO server provides proof of authentication, which can be used to access other systems within the organization without the need to authenticate again.
- Kerberos is a protocol used to implement SSO, that uses the notion of a ticket to contain the proof of authentication.
-
Federated SSO:
- Extends the concept of SSO to multiple organizations.
- A user can authenticate with an SSO server within one organization, and the proof of authentication will be valid to authenticate on a system within a different organization.
- Security Assertion Markup Language (SAML), OAuth, and OpenID Connect are known frameworks used to implement federated SSO.
-
Federated Identity Management:
- An arrangement that can be made between multiple enterprises to let subscribers use the same identification data to obtain access to the networks of all the enterprises in the group.
- Shibboleth is an example of an SSO system that allows people to sign in with a single digital identity and connect to various systems run by federations of different organizations.
-
Transitive Trust
-
The Transitive Property:
-
A mathematical or logical axiom which states:
- If A = B, and B = C, then A = C
-
When permissions are incorrectly defined, this leads to a condition known as transitive trust.
- A host (target) authenticates to, and is trusted by, a server. An attacker authenticates, and is trusted by, the same server.
- Because of their shared relationship with the server, the server may allow lateral privilege escalation. To prevent this, configure explicit user permissions.