SlideShare a Scribd company logo
1 of 13
Summary of
authentication
services.
Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of Expertise Industry Certifications
 PC Hardware
 Network Administration
 IT Project Management
 Network Design
 User Training
 IT Troubleshooting
Qualifications Summary
Education
 M.B.A., IT Management, Western Governor’s University
 B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
Page 3
– Function and purpose of authentication
services.
– Authentication services.
PACE-IT
Page 4
Summary of authentication services.
Page 5
A best practice in network
security is to require
authorization when access is
desired either to the network
or resources on the network.
Authentication services are basically the first step in the
authorization process. Authentication services require requesters
to prove that they are who they say they are by the submission of
some type of credentials (e.g., usernames and passwords). The
service then examines the credentials against a database.
The database will contain information on which credentials the
authentication service will accept. If accepted, one of two things
occurs—the authorization is granted or the authentication service
passes the approved credentials to an authorization service.
Summary of authentication services.
Page 6
Summary of authentication services.
Page 7
Authentication services may be
part of an AAA (Authentication,
Authorization and Accounting)
protocol.
AAA protocols will validate the credentials of the requester
(authentication), grant access to the resource (authorization), and
then log the requestor’s activity (accounting). All of these
separate functions can be combined into a single protocol.
In other cases, the individual services (i.e., authentication,
authorization, and accounting) are actually separated. In this
situation, the services will be set up in a manner in which they will
pass information back and forth in order to form a holistic, secure
environment.
Summary of authentication services.
Page 8
– RADIUS (Remote Authentication Dial-In
User Service).
» A remote access service that is used to authenticate remote
users and grant them access to authorized network resources.
» It is a popular AAA protocol used to help ensure that only
authenticated end users are using the network resources they
are authorized to use.
• The accounting features are very robust.
» Only the requester’s (the end user’s) password is encrypted.
– TACACS+ (Terminal Access Controller
Access-Control System Plus).
» A remote access service that is used to authenticate remote
devices and grant them access to authorized network
resources.
» It is a popular AAA protocol used to help ensure that only
authenticated remote network devices are using the network
resources they are authorized to use.
• The accounting features are not as robust as those of
RADIUS.
» All transmissions between devices are encrypted.
Summary of authentication services.
Page 9
– Kerberos.
» Authentication protocol, which uses TCP or UDP port 88.
» A system of authentication and authorization that works well in
environments that have a lot of clients.
» The Key Distribution Center (KDC) is the main component.
» The KDC has two parts—the authentication server (AS) and
the Ticket-Granting Service (TGS).
» When a user logs in, a hash of his or her username and
password is sent to the AS; if the AS likes the hash, it responds
with a ticket granting ticket (TGT) and a timestamp.
» The client sends the TGT with timestamp to the TGS.
» The TGS responds with a service ticket (can also be called an
access token or just a token).
» The service ticket (token) authorizes the user to access specific
resources.
» As long as the TGT is still valid, the TGS will grant
authorization by issuing a new service ticket.
Summary of authentication services.
Page 10
– LDAP (Lightweight Directory Access
Protocol).
» A directory service protocol that can be used to authenticate
clients.
• LDAP requests are sent over TCP port 389.
» Applications that are LDAP compliant will validate
(authenticate) the client and then retrieve the requested
information stored in the directory.
– Secure LDAP.
» Encrypted version of LDAP using SSL (Secure Socket Layer)
over TCP port 636.
• All communication between the client and LDAP is secure.
– SAML (Security Assertion Markup
Language).
» An XML (Extensible Markup Language) standard that is used to
allow systems to exchange authentication and authorization
information.
Summary of authentication services.
Page 11
Summary of authentication services.
Authentication services are the first step in the authorization process.
Authentication services check to ensure that requesters are who they claim
to be through a process of validating the requesters’ credentials (e.g.,
usernames and passwords) against information contained in a database. If
the credentials are accepted, they are then passed onto the authorization
service. If the credentials are rejected, so is the requester.
Topic
Function and purpose of
authentication services.
Summary
Authentication services may form part of an AAA protocol. AAA protocols
will perform authentication, authorization, and accounting services for
networks and network resources. Popular authentication services include:
RADIUS, TACACS+, Kerberos, LDAP, Secure LDAP, and SAML.
Authentication services.
Page 12
THANK YOU!
This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.

More Related Content

What's hot

PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPace IT at Edmonds Community College
 
Security and information assurance
Security and information assuranceSecurity and information assurance
Security and information assurancebdemchak
 
Chapter 3 security principals
Chapter 3 security principalsChapter 3 security principals
Chapter 3 security principalsnewbie2019
 
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor AuthenticationAddressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor AuthenticationPeter Choi
 
12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)Patrick Garrett
 
Banking and Modern Payments System Security Analysis
Banking and Modern Payments System Security AnalysisBanking and Modern Payments System Security Analysis
Banking and Modern Payments System Security AnalysisCSCJournals
 
Ch19 E Commerce Security
Ch19 E Commerce SecurityCh19 E Commerce Security
Ch19 E Commerce Securityphanleson
 
Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce  Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce Titas Ahmed
 
Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Amrit Chhetri
 

What's hot (20)

PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
 
PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)
PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)
PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
 
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
PACE-IT, Security+3.3: Summary of Social Engineering AttacksPACE-IT, Security+3.3: Summary of Social Engineering Attacks
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
 
Security and information assurance
Security and information assuranceSecurity and information assurance
Security and information assurance
 
C02
C02C02
C02
 
Chapter 3 security principals
Chapter 3 security principalsChapter 3 security principals
Chapter 3 security principals
 
PACE-IT: Physical Network Security Control
PACE-IT: Physical Network Security ControlPACE-IT: Physical Network Security Control
PACE-IT: Physical Network Security Control
 
PACE-IT: Network Hardening Techniques (part 3)
PACE-IT: Network Hardening Techniques (part 3)PACE-IT: Network Hardening Techniques (part 3)
PACE-IT: Network Hardening Techniques (part 3)
 
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor AuthenticationAddressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
 
PACE-IT: Network Hardening Techniques (part 2)
PACE-IT: Network Hardening Techniques (part 2)PACE-IT: Network Hardening Techniques (part 2)
PACE-IT: Network Hardening Techniques (part 2)
 
PACE-IT: Network Hardening Techniques (part 1)
PACE-IT: Network Hardening Techniques (part 1)PACE-IT: Network Hardening Techniques (part 1)
PACE-IT: Network Hardening Techniques (part 1)
 
12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)
 
Banking and Modern Payments System Security Analysis
Banking and Modern Payments System Security AnalysisBanking and Modern Payments System Security Analysis
Banking and Modern Payments System Security Analysis
 
Ch19 E Commerce Security
Ch19 E Commerce SecurityCh19 E Commerce Security
Ch19 E Commerce Security
 
Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce  Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce
 
Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021
 

Viewers also liked

Viewers also liked (12)

PACE-IT, Security+3.2: Summary of Types of Attacks (part 1)
PACE-IT, Security+3.2: Summary of Types of Attacks (part 1)PACE-IT, Security+3.2: Summary of Types of Attacks (part 1)
PACE-IT, Security+3.2: Summary of Types of Attacks (part 1)
 
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host SecurityPACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
 
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
 
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data SecurityPACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
 
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement TechniquesPACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement Techniques
 
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment ToolsPACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment Tools
 
PACE-IT, Security+3.4: Summary of Wireless Attacks
PACE-IT, Security+3.4: Summary of Wireless AttacksPACE-IT, Security+3.4: Summary of Wireless Attacks
PACE-IT, Security+3.4: Summary of Wireless Attacks
 
PACE-IT, Security+3.8: Vulnerability Scanning vs Pen Testing
PACE-IT, Security+3.8: Vulnerability Scanning vs Pen TestingPACE-IT, Security+3.8: Vulnerability Scanning vs Pen Testing
PACE-IT, Security+3.8: Vulnerability Scanning vs Pen Testing
 
PACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of MalwarePACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of Malware
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
 
PACE-IT, Security+2.9: Goals of Security Controls
PACE-IT, Security+2.9: Goals of Security ControlsPACE-IT, Security+2.9: Goals of Security Controls
PACE-IT, Security+2.9: Goals of Security Controls
 

PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)

  • 2. Page 2 Instructor, PACE-IT Program – Edmonds Community College Areas of Expertise Industry Certifications  PC Hardware  Network Administration  IT Project Management  Network Design  User Training  IT Troubleshooting Qualifications Summary Education  M.B.A., IT Management, Western Governor’s University  B.S., IT Security, Western Governor’s University Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.
  • 3. Page 3 – Function and purpose of authentication services. – Authentication services. PACE-IT
  • 4. Page 4 Summary of authentication services.
  • 5. Page 5 A best practice in network security is to require authorization when access is desired either to the network or resources on the network. Authentication services are basically the first step in the authorization process. Authentication services require requesters to prove that they are who they say they are by the submission of some type of credentials (e.g., usernames and passwords). The service then examines the credentials against a database. The database will contain information on which credentials the authentication service will accept. If accepted, one of two things occurs—the authorization is granted or the authentication service passes the approved credentials to an authorization service. Summary of authentication services.
  • 6. Page 6 Summary of authentication services.
  • 7. Page 7 Authentication services may be part of an AAA (Authentication, Authorization and Accounting) protocol. AAA protocols will validate the credentials of the requester (authentication), grant access to the resource (authorization), and then log the requestor’s activity (accounting). All of these separate functions can be combined into a single protocol. In other cases, the individual services (i.e., authentication, authorization, and accounting) are actually separated. In this situation, the services will be set up in a manner in which they will pass information back and forth in order to form a holistic, secure environment. Summary of authentication services.
  • 8. Page 8 – RADIUS (Remote Authentication Dial-In User Service). » A remote access service that is used to authenticate remote users and grant them access to authorized network resources. » It is a popular AAA protocol used to help ensure that only authenticated end users are using the network resources they are authorized to use. • The accounting features are very robust. » Only the requester’s (the end user’s) password is encrypted. – TACACS+ (Terminal Access Controller Access-Control System Plus). » A remote access service that is used to authenticate remote devices and grant them access to authorized network resources. » It is a popular AAA protocol used to help ensure that only authenticated remote network devices are using the network resources they are authorized to use. • The accounting features are not as robust as those of RADIUS. » All transmissions between devices are encrypted. Summary of authentication services.
  • 9. Page 9 – Kerberos. » Authentication protocol, which uses TCP or UDP port 88. » A system of authentication and authorization that works well in environments that have a lot of clients. » The Key Distribution Center (KDC) is the main component. » The KDC has two parts—the authentication server (AS) and the Ticket-Granting Service (TGS). » When a user logs in, a hash of his or her username and password is sent to the AS; if the AS likes the hash, it responds with a ticket granting ticket (TGT) and a timestamp. » The client sends the TGT with timestamp to the TGS. » The TGS responds with a service ticket (can also be called an access token or just a token). » The service ticket (token) authorizes the user to access specific resources. » As long as the TGT is still valid, the TGS will grant authorization by issuing a new service ticket. Summary of authentication services.
  • 10. Page 10 – LDAP (Lightweight Directory Access Protocol). » A directory service protocol that can be used to authenticate clients. • LDAP requests are sent over TCP port 389. » Applications that are LDAP compliant will validate (authenticate) the client and then retrieve the requested information stored in the directory. – Secure LDAP. » Encrypted version of LDAP using SSL (Secure Socket Layer) over TCP port 636. • All communication between the client and LDAP is secure. – SAML (Security Assertion Markup Language). » An XML (Extensible Markup Language) standard that is used to allow systems to exchange authentication and authorization information. Summary of authentication services.
  • 11. Page 11 Summary of authentication services. Authentication services are the first step in the authorization process. Authentication services check to ensure that requesters are who they claim to be through a process of validating the requesters’ credentials (e.g., usernames and passwords) against information contained in a database. If the credentials are accepted, they are then passed onto the authorization service. If the credentials are rejected, so is the requester. Topic Function and purpose of authentication services. Summary Authentication services may form part of an AAA protocol. AAA protocols will perform authentication, authorization, and accounting services for networks and network resources. Popular authentication services include: RADIUS, TACACS+, Kerberos, LDAP, Secure LDAP, and SAML. Authentication services.
  • 13. This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53. PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.