L04 Authentication and Access Control
L04 Authentication and Access Control
Lecture 4
Erland Jonsson
Department of Computer Science and Engineering
Chalmers University of Technology
Sweden
User authentication
Authentication – definition
Authentication is verifying a user’s identity
cp: message authentication: is check of
message authenticity (Sw. äkthet) and source
In an OS each account has one identifier
(e.g. username) and one authenticator
(e.g. password)
The identifier tells who you are.
The authenticator verifies that this is true, i.e. it
provides a secure coupling between the user
and his account
User Authentication
fundamental security building block
– basis of access control & user accountability
is the process of verifying an identity
claimed by or for a system entity
has two steps:
– identification - specify identifier
– verification - bind entity (person) and
identifier
distinct from message authentication
Authentication procedure
The authentication procedure consists of 4 stages:
- eavesdropping
- manipuation of routers, gateways
- replay attacks
Role-
Based
Access
Control
Role to Access
Right: