SlideShare a Scribd company logo
Summary of
authentication
services.
Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of Expertise Industry Certifications
 PC Hardware
 Network Administration
 IT Project Management
 Network Design
 User Training
 IT Troubleshooting
Qualifications Summary
Education
 M.B.A., IT Management, Western Governor’s University
 B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
Page 3
– Function and purpose of authentication
services.
– Authentication services.
PACE-IT
Page 4
Summary of authentication services.
Page 5
A best practice in network
security is to require
authorization when access is
desired either to the network
or resources on the network.
Authentication services are basically the first step in the
authorization process. Authentication services require requesters
to prove that they are who they say they are by the submission of
some type of credentials (e.g., usernames and passwords). The
service then examines the credentials against a database.
The database will contain information on which credentials the
authentication service will accept. If accepted, one of two things
occurs—the authorization is granted or the authentication service
passes the approved credentials to an authorization service.
Summary of authentication services.
Page 6
Summary of authentication services.
Page 7
Authentication services may be
part of an AAA (Authentication,
Authorization and Accounting)
protocol.
AAA protocols will validate the credentials of the requester
(authentication), grant access to the resource (authorization), and
then log the requestor’s activity (accounting). All of these
separate functions can be combined into a single protocol.
In other cases, the individual services (i.e., authentication,
authorization, and accounting) are actually separated. In this
situation, the services will be set up in a manner in which they will
pass information back and forth in order to form a holistic, secure
environment.
Summary of authentication services.
Page 8
– RADIUS (Remote Authentication Dial-In
User Service).
» A remote access service that is used to authenticate remote
users and grant them access to authorized network resources.
» It is a popular AAA protocol used to help ensure that only
authenticated end users are using the network resources they
are authorized to use.
• The accounting features are very robust.
» Only the requester’s (the end user’s) password is encrypted.
– TACACS+ (Terminal Access Controller
Access-Control System Plus).
» A remote access service that is used to authenticate remote
devices and grant them access to authorized network
resources.
» It is a popular AAA protocol used to help ensure that only
authenticated remote network devices are using the network
resources they are authorized to use.
• The accounting features are not as robust as those of
RADIUS.
» All transmissions between devices are encrypted.
Summary of authentication services.
Page 9
– Kerberos.
» Authentication protocol, which uses TCP or UDP port 88.
» A system of authentication and authorization that works well in
environments that have a lot of clients.
» The Key Distribution Center (KDC) is the main component.
» The KDC has two parts—the authentication server (AS) and
the Ticket-Granting Service (TGS).
» When a user logs in, a hash of his or her username and
password is sent to the AS; if the AS likes the hash, it responds
with a ticket granting ticket (TGT) and a timestamp.
» The client sends the TGT with timestamp to the TGS.
» The TGS responds with a service ticket (can also be called an
access token or just a token).
» The service ticket (token) authorizes the user to access specific
resources.
» As long as the TGT is still valid, the TGS will grant
authorization by issuing a new service ticket.
Summary of authentication services.
Page 10
– LDAP (Lightweight Directory Access
Protocol).
» A directory service protocol that can be used to authenticate
clients.
• LDAP requests are sent over TCP port 389.
» Applications that are LDAP compliant will validate
(authenticate) the client and then retrieve the requested
information stored in the directory.
– Secure LDAP.
» Encrypted version of LDAP using SSL (Secure Socket Layer)
over TCP port 636.
• All communication between the client and LDAP is secure.
– SAML (Security Assertion Markup
Language).
» An XML (Extensible Markup Language) standard that is used to
allow systems to exchange authentication and authorization
information.
Summary of authentication services.
Page 11
Summary of authentication services.
Authentication services are the first step in the authorization process.
Authentication services check to ensure that requesters are who they claim
to be through a process of validating the requesters’ credentials (e.g.,
usernames and passwords) against information contained in a database. If
the credentials are accepted, they are then passed onto the authorization
service. If the credentials are rejected, so is the requester.
Topic
Function and purpose of
authentication services.
Summary
Authentication services may form part of an AAA protocol. AAA protocols
will perform authentication, authorization, and accounting services for
networks and network resources. Popular authentication services include:
RADIUS, TACACS+, Kerberos, LDAP, Secure LDAP, and SAML.
Authentication services.
Page 12
THANK YOU!
This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.

More Related Content

PPTX
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PPTX
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PPTX
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PPTX
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PPTX
PACE-IT, Security + 5.3: Security Controls for Account Management
PPTX
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PPTX
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PPTX
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)

What's hot (20)

PPTX
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PPTX
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PPTX
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PPTX
PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)
PPTX
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PPTX
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PPTX
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PPTX
PACE-IT: Network Hardening Techniques (part 3)
PDF
Chapter 3 security principals
PPT
Security and information assurance
PPTX
PACE-IT: Network Hardening Techniques (part 2)
PDF
PDF
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
PDF
12-19-14 CLE for South (P Garrett)
PPTX
Hunting the Evil of your Infrastructure
PDF
Banking and Modern Payments System Security Analysis
PDF
Cyber forensics intro & requirement engineering cit dec 21,2013
PDF
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
PDF
Multi level parsing based approach against phishing attacks with the help of ...
PDF
Ctia course outline
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT: Network Hardening Techniques (part 3)
Chapter 3 security principals
Security and information assurance
PACE-IT: Network Hardening Techniques (part 2)
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
12-19-14 CLE for South (P Garrett)
Hunting the Evil of your Infrastructure
Banking and Modern Payments System Security Analysis
Cyber forensics intro & requirement engineering cit dec 21,2013
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
Multi level parsing based approach against phishing attacks with the help of ...
Ctia course outline
Ad

Viewers also liked (12)

PPTX
PACE-IT, Security+3.2: Summary of Types of Attacks (part 1)
PPTX
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PPTX
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PPTX
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
PPTX
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PPTX
PACE-IT, Security+3.6: Security Enhancement Techniques
PPTX
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PPTX
PACE-IT, Security+3.4: Summary of Wireless Attacks
PPTX
PACE-IT, Security+3.8: Vulnerability Scanning vs Pen Testing
PPTX
PACE-IT, Security+3.1: Types of Malware
PPTX
Cloud Computing
PPTX
PACE-IT, Security+2.9: Goals of Security Controls
PACE-IT, Security+3.2: Summary of Types of Attacks (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.4: Summary of Wireless Attacks
PACE-IT, Security+3.8: Vulnerability Scanning vs Pen Testing
PACE-IT, Security+3.1: Types of Malware
Cloud Computing
PACE-IT, Security+2.9: Goals of Security Controls
Ad

Similar to PACE-IT, Security + 5.1: Summary of Authentication Services (20)

PPT
Ch08 Authentication
PDF
Ericas-Security-Plus-Study-Guide
PPTX
PACE-IT: Networking Services and Applications (part 2) - N10 006
PPT
1 security goals
PPSX
Secure electronic transaction
PDF
Ccna sec 01
PPTX
501 ch 2 understanding iam
PDF
Network Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. IT
PDF
network security.pdf
PDF
CyberSecurity101.pdf
PPTX
Network security by sandhya
PPTX
Crypto passport authentication
PPTX
Crypto passport authentication
PPTX
Crypto passport authentication
PPTX
Crypto passport authentication
PPTX
Crypto passport authentication
PPTX
Crypto passport authentication
PPTX
Crypto passport authentication
PPTX
Authentication
PPT
Network Security 2016
Ch08 Authentication
Ericas-Security-Plus-Study-Guide
PACE-IT: Networking Services and Applications (part 2) - N10 006
1 security goals
Secure electronic transaction
Ccna sec 01
501 ch 2 understanding iam
Network Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. IT
network security.pdf
CyberSecurity101.pdf
Network security by sandhya
Crypto passport authentication
Crypto passport authentication
Crypto passport authentication
Crypto passport authentication
Crypto passport authentication
Crypto passport authentication
Crypto passport authentication
Authentication
Network Security 2016

Recently uploaded (20)

PDF
Pre independence Education in Inndia.pdf
PDF
Business Ethics Teaching Materials for college
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Insiders guide to clinical Medicine.pdf
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
Institutional Correction lecture only . . .
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Complications of Minimal Access Surgery at WLH
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
RMMM.pdf make it easy to upload and study
PPTX
master seminar digital applications in india
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PDF
Microbial disease of the cardiovascular and lymphatic systems
Pre independence Education in Inndia.pdf
Business Ethics Teaching Materials for college
O5-L3 Freight Transport Ops (International) V1.pdf
2.FourierTransform-ShortQuestionswithAnswers.pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
Insiders guide to clinical Medicine.pdf
Module 4: Burden of Disease Tutorial Slides S2 2025
Abdominal Access Techniques with Prof. Dr. R K Mishra
Institutional Correction lecture only . . .
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Complications of Minimal Access Surgery at WLH
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
RMMM.pdf make it easy to upload and study
master seminar digital applications in india
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
102 student loan defaulters named and shamed – Is someone you know on the list?
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
Microbial disease of the cardiovascular and lymphatic systems

PACE-IT, Security + 5.1: Summary of Authentication Services

  • 2. Page 2 Instructor, PACE-IT Program – Edmonds Community College Areas of Expertise Industry Certifications  PC Hardware  Network Administration  IT Project Management  Network Design  User Training  IT Troubleshooting Qualifications Summary Education  M.B.A., IT Management, Western Governor’s University  B.S., IT Security, Western Governor’s University Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.
  • 3. Page 3 – Function and purpose of authentication services. – Authentication services. PACE-IT
  • 4. Page 4 Summary of authentication services.
  • 5. Page 5 A best practice in network security is to require authorization when access is desired either to the network or resources on the network. Authentication services are basically the first step in the authorization process. Authentication services require requesters to prove that they are who they say they are by the submission of some type of credentials (e.g., usernames and passwords). The service then examines the credentials against a database. The database will contain information on which credentials the authentication service will accept. If accepted, one of two things occurs—the authorization is granted or the authentication service passes the approved credentials to an authorization service. Summary of authentication services.
  • 6. Page 6 Summary of authentication services.
  • 7. Page 7 Authentication services may be part of an AAA (Authentication, Authorization and Accounting) protocol. AAA protocols will validate the credentials of the requester (authentication), grant access to the resource (authorization), and then log the requestor’s activity (accounting). All of these separate functions can be combined into a single protocol. In other cases, the individual services (i.e., authentication, authorization, and accounting) are actually separated. In this situation, the services will be set up in a manner in which they will pass information back and forth in order to form a holistic, secure environment. Summary of authentication services.
  • 8. Page 8 – RADIUS (Remote Authentication Dial-In User Service). » A remote access service that is used to authenticate remote users and grant them access to authorized network resources. » It is a popular AAA protocol used to help ensure that only authenticated end users are using the network resources they are authorized to use. • The accounting features are very robust. » Only the requester’s (the end user’s) password is encrypted. – TACACS+ (Terminal Access Controller Access-Control System Plus). » A remote access service that is used to authenticate remote devices and grant them access to authorized network resources. » It is a popular AAA protocol used to help ensure that only authenticated remote network devices are using the network resources they are authorized to use. • The accounting features are not as robust as those of RADIUS. » All transmissions between devices are encrypted. Summary of authentication services.
  • 9. Page 9 – Kerberos. » Authentication protocol, which uses TCP or UDP port 88. » A system of authentication and authorization that works well in environments that have a lot of clients. » The Key Distribution Center (KDC) is the main component. » The KDC has two parts—the authentication server (AS) and the Ticket-Granting Service (TGS). » When a user logs in, a hash of his or her username and password is sent to the AS; if the AS likes the hash, it responds with a ticket granting ticket (TGT) and a timestamp. » The client sends the TGT with timestamp to the TGS. » The TGS responds with a service ticket (can also be called an access token or just a token). » The service ticket (token) authorizes the user to access specific resources. » As long as the TGT is still valid, the TGS will grant authorization by issuing a new service ticket. Summary of authentication services.
  • 10. Page 10 – LDAP (Lightweight Directory Access Protocol). » A directory service protocol that can be used to authenticate clients. • LDAP requests are sent over TCP port 389. » Applications that are LDAP compliant will validate (authenticate) the client and then retrieve the requested information stored in the directory. – Secure LDAP. » Encrypted version of LDAP using SSL (Secure Socket Layer) over TCP port 636. • All communication between the client and LDAP is secure. – SAML (Security Assertion Markup Language). » An XML (Extensible Markup Language) standard that is used to allow systems to exchange authentication and authorization information. Summary of authentication services.
  • 11. Page 11 Summary of authentication services. Authentication services are the first step in the authorization process. Authentication services check to ensure that requesters are who they claim to be through a process of validating the requesters’ credentials (e.g., usernames and passwords) against information contained in a database. If the credentials are accepted, they are then passed onto the authorization service. If the credentials are rejected, so is the requester. Topic Function and purpose of authentication services. Summary Authentication services may form part of an AAA protocol. AAA protocols will perform authentication, authorization, and accounting services for networks and network resources. Popular authentication services include: RADIUS, TACACS+, Kerberos, LDAP, Secure LDAP, and SAML. Authentication services.
  • 13. This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53. PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.