7
Authorization vs. Authentication Authentication is the process of proving identity to the system – login Authorization happens after authentication. It determines what you have rights to. Data access, read/write/modify Program execution allowed or not Ability to search directories

Authorization vs. Authentication Authentication is the process of proving identity to the system –login Authorization happens after authentication. It

Embed Size (px)

Citation preview

Page 1: Authorization vs. Authentication Authentication is the process of proving identity to the system –login Authorization happens after authentication. It

Authorization vs. Authentication

• Authentication is the process of proving identity to the system– login

• Authorization happens after authentication. It determines what you have rights to.– Data access, read/write/modify

– Program execution allowed or not

– Ability to search directories

Page 2: Authorization vs. Authentication Authentication is the process of proving identity to the system –login Authorization happens after authentication. It

Authentication

• Authentication has proven to be one of the most difficult tasks in system security.– What can be used to uniquely identify a user or group

to the system and still be secure?

Page 3: Authorization vs. Authentication Authentication is the process of proving identity to the system –login Authorization happens after authentication. It

Authentication

• Methods– Userid/password

• Easy to implement

• Hard to administer– Difficult requiring users to have adequate passwords

– What is an adequate password?

– Humans have bad memories. What was my password?

– Should there be a time limit on the password?

– ID Cards• Requires some equipment cost

• Doesn’t guarantee the actual user is the one with the card

• What about lost/stolen cards?

Page 4: Authorization vs. Authentication Authentication is the process of proving identity to the system –login Authorization happens after authentication. It

Authentication

• Methods– ID Cards / password

• The id card acts as a user id• Adds no more security.• Combines the worst of both the userid/password

system and the ID card system

– Biometrics• Fingerprint

– Expensive hardware (getting cheaper)– What happens when the user gets a cut, or was gardening

over the weekend?

Page 5: Authorization vs. Authentication Authentication is the process of proving identity to the system –login Authorization happens after authentication. It

Authentication

• Methods– Biometrics

• Iris Scan– Very expensive equipment– Many false negatives– What happens with contacts?– What about eyes exams?

• Facial Recognition– Very expensive– Has not worked once yet?

• In all forms of authentication some sort of manual bypass is required!– Which allows for social engineering exploits!

Page 6: Authorization vs. Authentication Authentication is the process of proving identity to the system –login Authorization happens after authentication. It

Authorization

• There are two major ways of providing authorization– UNIX file permissions– ACL (Access Control List)

• Created by Novel

• Used by Microsoft – with some changes!

Page 7: Authorization vs. Authentication Authentication is the process of proving identity to the system –login Authorization happens after authentication. It

• When you have a problem with your machine and you are on a tech support call, do you give your super user / administrator password to the technician?