SlideShare a Scribd company logo
1 of 19
Download to read offline
1
What is Authentication?
 Remember, from before:
 Authentication
 The process of reliably verifying the identity of someone or something
 In particular, did a message indeed come from its specified sender?
 When authenticating messages, we need to guard against:
 Disclosure of a message to any unauthorized person or system
 Messages masquerading as being from a source
 Content modification
 Was the message changed between sender and recipient?)
 Source or destination repudiation
 Can the sender or recipient deny they sent/received the message?
2
Identification, Authentication, Authorization
 Be sure to distinguish these three concepts:
 Identification
 Associating an identity with a subject
 Authentication
 Establishing the validity of something, such as an identity
 Authorization
 Associating rights or capabilities with a subject
3
What are we Authenticating?
 Authentication of a person
 Others know you by your appearance or voice
 By your picture on an identification badge
 Other information you have or know
 Authentication of a computer
 Computer authenticating another computer
 Print spooler authenticating a printer, etc.
 Person using a public workstation
 Workstation will (should) not store authentication information for every user.
 Person needs to remember the authentication information
What Is a Directory Service?
A service that helps track and locate objects on a network
A service that helps track and locate objects on a network
Active Directory Management
Users
Services
Workstations Files
 A directory service that uses the “tree” concept for managing resources on a Windows
network.
 Stores information about the network resources and services, such as user data, printer,
servers, databases, groups, computers, and security policies.
 Identifies all resources on a network and makes them accessible to users and applications.
Active Directory Functions and Benefits
 Centralized resource and security administration.
 Single logon for access to global resources.
 Fault tolerance and redundancy.
 Simplified resource location.
Active Directory Components
 Forests – One or more domain trees, with each tree having its own unique
name space.
 Domain trees – One or more domains with contiguous name space.
 Domains – A logical unit of computers and network resources that defines a
security boundary.
 Organization Units (OUs): A container that represents a logical grouping of
resources
Active Directory Domains
Boundary of
Authentication
Boundary of
Policies
Boundary of Replication
CONTOSO.COM
Active Directory Trees
CONTOSO.COM
US.CONTOSO.COM
Shared
Schema
Configuration
Global Catalog
OHIO.US.CONTOSO.COM
Active Directory Forests
US.CONTOSO.COM
FABRIKAM.COM
UK.FABRIKAM.COM
CONTOSO.COM
Schema Configuration
Global
Catalog
Organizational Units
CONTOSO.COM
OU Admin
Organized For:
•Administration
•Same Requirements
•Delegation
•Group Policy
•Configuration
•Security
Organized For:
•Administration
•Same Requirements
•Delegation
•Group Policy
•Configuration
•Security
OU Policy
OU Security
Domain Controllers
Windows Server
DC
DC
DC
 Server that stores the Active Directory database
and authenticates users with the network
during logon.
 Stores database information in a file called
ntds.dit.
 Active Directory is a multimaster database.
 Information is automatically replicated between
multiple domain controllers.
Authentication.pdf
Authentication.pdf
Authentication.pdf
Authentication.pdf
Authentication.pdf
Authentication.pdf
Authentication.pdf
Authentication.pdf

More Related Content

Similar to Authentication.pdf

Microsoft Active Directory
Microsoft Active DirectoryMicrosoft Active Directory
Microsoft Active Directory
thebigredhemi
 
Directions Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docxDirections Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docx
mariona83
 
CHAPTER 7 Authentication and Authorization On
CHAPTER  7 Authentication and Authorization OnCHAPTER  7 Authentication and Authorization On
CHAPTER 7 Authentication and Authorization On
MaximaSheffield592
 
Certified Information Systems Security Professional (cissp) Domain “access co...
Certified Information Systems Security Professional (cissp) Domain “access co...Certified Information Systems Security Professional (cissp) Domain “access co...
Certified Information Systems Security Professional (cissp) Domain “access co...
master student
 
proposed solution to resource sharing and security against unauthorize.docx
proposed solution to resource sharing and security against unauthorize.docxproposed solution to resource sharing and security against unauthorize.docx
proposed solution to resource sharing and security against unauthorize.docx
todd921
 
Information System Security introduction
Information System Security introductionInformation System Security introduction
Information System Security introduction
Shu Shin
 
Documentum content server
Documentum content serverDocumentum content server
Documentum content server
Sanjay Singh
 

Similar to Authentication.pdf (20)

Microsoft Active Directory
Microsoft Active DirectoryMicrosoft Active Directory
Microsoft Active Directory
 
Lotus Admin Training Part I
Lotus Admin Training Part ILotus Admin Training Part I
Lotus Admin Training Part I
 
New PPT Presentation.pptx
New PPT Presentation.pptxNew PPT Presentation.pptx
New PPT Presentation.pptx
 
original.pdf
original.pdforiginal.pdf
original.pdf
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
 
Secure Objects
Secure ObjectsSecure Objects
Secure Objects
 
Primend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisusPrimend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisus
 
Directions Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docxDirections Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docx
 
Authentication Authorization-Lesson-2-Slides.ppt
Authentication Authorization-Lesson-2-Slides.pptAuthentication Authorization-Lesson-2-Slides.ppt
Authentication Authorization-Lesson-2-Slides.ppt
 
CHAPTER 7 Authentication and Authorization On
CHAPTER  7 Authentication and Authorization OnCHAPTER  7 Authentication and Authorization On
CHAPTER 7 Authentication and Authorization On
 
Certified Information Systems Security Professional (cissp) Domain “access co...
Certified Information Systems Security Professional (cissp) Domain “access co...Certified Information Systems Security Professional (cissp) Domain “access co...
Certified Information Systems Security Professional (cissp) Domain “access co...
 
proposed solution to resource sharing and security against unauthorize.docx
proposed solution to resource sharing and security against unauthorize.docxproposed solution to resource sharing and security against unauthorize.docx
proposed solution to resource sharing and security against unauthorize.docx
 
Information System Security introduction
Information System Security introductionInformation System Security introduction
Information System Security introduction
 
A Novel methodology for handling Document Level Security in Search Based Appl...
A Novel methodology for handling Document Level Security in Search Based Appl...A Novel methodology for handling Document Level Security in Search Based Appl...
A Novel methodology for handling Document Level Security in Search Based Appl...
 
Documentum content server
Documentum content serverDocumentum content server
Documentum content server
 
Computing safety ryr
Computing safety ryrComputing safety ryr
Computing safety ryr
 
Value Microsoft 365 E5 English
Value Microsoft 365 E5 EnglishValue Microsoft 365 E5 English
Value Microsoft 365 E5 English
 
Network security chapter 1
Network security   chapter 1Network security   chapter 1
Network security chapter 1
 
Daniel "Dazza" Greenwood's Keynote Address on Digital Identity to the OECD in...
Daniel "Dazza" Greenwood's Keynote Address on Digital Identity to the OECD in...Daniel "Dazza" Greenwood's Keynote Address on Digital Identity to the OECD in...
Daniel "Dazza" Greenwood's Keynote Address on Digital Identity to the OECD in...
 
Administer Active Directory
Administer Active DirectoryAdminister Active Directory
Administer Active Directory
 

More from karthikvcyber

Security Information Event Management Security Information Event Management
Security Information Event Management Security Information Event ManagementSecurity Information Event Management Security Information Event Management
Security Information Event Management Security Information Event Management
karthikvcyber
 
cybersecuritycybersecuritycybersecuritycybersecurity
cybersecuritycybersecuritycybersecuritycybersecuritycybersecuritycybersecuritycybersecuritycybersecurity
cybersecuritycybersecuritycybersecuritycybersecurity
karthikvcyber
 

More from karthikvcyber (20)

Security Incident machnism Security Incident machnismSecurity Incident machni...
Security Incident machnism Security Incident machnismSecurity Incident machni...Security Incident machnism Security Incident machnismSecurity Incident machni...
Security Incident machnism Security Incident machnismSecurity Incident machni...
 
Security Information Event Management Security Information Event Management
Security Information Event Management Security Information Event ManagementSecurity Information Event Management Security Information Event Management
Security Information Event Management Security Information Event Management
 
cybersecuritycybersecuritycybersecuritycybersecurity
cybersecuritycybersecuritycybersecuritycybersecuritycybersecuritycybersecuritycybersecuritycybersecurity
cybersecuritycybersecuritycybersecuritycybersecurity
 
Standards & Framework.pdf
Standards & Framework.pdfStandards & Framework.pdf
Standards & Framework.pdf
 
Standards & Framework.ppt
Standards & Framework.pptStandards & Framework.ppt
Standards & Framework.ppt
 
OSINT.pptx
OSINT.pptxOSINT.pptx
OSINT.pptx
 
Encrypto.pptx
Encrypto.pptxEncrypto.pptx
Encrypto.pptx
 
PID-PPID.pptx
PID-PPID.pptxPID-PPID.pptx
PID-PPID.pptx
 
Authentication.pptx
Authentication.pptxAuthentication.pptx
Authentication.pptx
 
SIEM.pptx
SIEM.pptxSIEM.pptx
SIEM.pptx
 
VAPT_FINAL SLIDES.pptx
VAPT_FINAL SLIDES.pptxVAPT_FINAL SLIDES.pptx
VAPT_FINAL SLIDES.pptx
 
cryptography-Final.pptx
cryptography-Final.pptxcryptography-Final.pptx
cryptography-Final.pptx
 
fileanddirectory-PID.pptx
fileanddirectory-PID.pptxfileanddirectory-PID.pptx
fileanddirectory-PID.pptx
 
CS_Tuto.ppt
CS_Tuto.pptCS_Tuto.ppt
CS_Tuto.ppt
 
Vuln.ppt
Vuln.pptVuln.ppt
Vuln.ppt
 
IP_Subnet training.pptx
IP_Subnet training.pptxIP_Subnet training.pptx
IP_Subnet training.pptx
 
IPS NAT and VPN.pptx
IPS NAT and VPN.pptxIPS NAT and VPN.pptx
IPS NAT and VPN.pptx
 
CCNP.ppt
CCNP.pptCCNP.ppt
CCNP.ppt
 
subnet.pptx
subnet.pptxsubnet.pptx
subnet.pptx
 
OSI TCP-IP.pptx
OSI TCP-IP.pptxOSI TCP-IP.pptx
OSI TCP-IP.pptx
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Recently uploaded (20)

Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 

Authentication.pdf

  • 1. 1 What is Authentication?  Remember, from before:  Authentication  The process of reliably verifying the identity of someone or something  In particular, did a message indeed come from its specified sender?  When authenticating messages, we need to guard against:  Disclosure of a message to any unauthorized person or system  Messages masquerading as being from a source  Content modification  Was the message changed between sender and recipient?)  Source or destination repudiation  Can the sender or recipient deny they sent/received the message?
  • 2. 2 Identification, Authentication, Authorization  Be sure to distinguish these three concepts:  Identification  Associating an identity with a subject  Authentication  Establishing the validity of something, such as an identity  Authorization  Associating rights or capabilities with a subject
  • 3. 3 What are we Authenticating?  Authentication of a person  Others know you by your appearance or voice  By your picture on an identification badge  Other information you have or know  Authentication of a computer  Computer authenticating another computer  Print spooler authenticating a printer, etc.  Person using a public workstation  Workstation will (should) not store authentication information for every user.  Person needs to remember the authentication information
  • 4. What Is a Directory Service? A service that helps track and locate objects on a network A service that helps track and locate objects on a network Active Directory Management Users Services Workstations Files  A directory service that uses the “tree” concept for managing resources on a Windows network.  Stores information about the network resources and services, such as user data, printer, servers, databases, groups, computers, and security policies.  Identifies all resources on a network and makes them accessible to users and applications.
  • 5. Active Directory Functions and Benefits  Centralized resource and security administration.  Single logon for access to global resources.  Fault tolerance and redundancy.  Simplified resource location.
  • 6. Active Directory Components  Forests – One or more domain trees, with each tree having its own unique name space.  Domain trees – One or more domains with contiguous name space.  Domains – A logical unit of computers and network resources that defines a security boundary.  Organization Units (OUs): A container that represents a logical grouping of resources
  • 7. Active Directory Domains Boundary of Authentication Boundary of Policies Boundary of Replication CONTOSO.COM
  • 10. Organizational Units CONTOSO.COM OU Admin Organized For: •Administration •Same Requirements •Delegation •Group Policy •Configuration •Security Organized For: •Administration •Same Requirements •Delegation •Group Policy •Configuration •Security OU Policy OU Security
  • 11. Domain Controllers Windows Server DC DC DC  Server that stores the Active Directory database and authenticates users with the network during logon.  Stores database information in a file called ntds.dit.  Active Directory is a multimaster database.  Information is automatically replicated between multiple domain controllers.