Title: Authentication and access control overview
1Authentication and access control overview
2Outline
- Definitions
- Authentication
- Factors
- Evaluation
- Examples
- Access control
- Case study Convenient SecureID
- Case study Website mutual authentication
3Definitions
- Identification - a claim about identity
- Who or what I am (global or local)
- Authentication - confirming that claims are true
- I am who I say I am
- I have a valid credential
- Authorization - granting permission based on a
valid claim - Now that I have been validated, I am allowed to
access certain resources or take certain actions - Access control system - a system that
authenticates users and gives them access to
resources based on their authorizations - Includes or relies upon an authentication
mechanism - May include the ability to grant course or
fine-grained authorizations, revoke or delegate
authorizations
4Building blocks of authentication
- Factors
- Something you know (or recognize)
- Something you have
- Something you are
- Two factors are better than one
- Especially two factors from different categories
- What are some examples of each of these factors?
- What are some examples of two-factor
authentication?
5Authentication mechanisms
- Text-based passwords
- Graphical passwords
- Hardware tokens
- Public key crypto protocols
- Biometrics
6Evaluation
- Accessibility
- Memorability
- Security
- Cost
- Environmental considerations
7Typical password advice
8Typical password advice
- Pick a hard to guess password
- Dont use it anywhere else
- Change it often
- Dont write it down
- So what do you do when every web site you visit
asks for a password?
9 Bank b3aYZ Amazon aa66x! Phonebill
p2ta1
10(No Transcript)
11Problems with Passwords
- Selection
- Difficult to think of a good password
- Passwords people think of first are easy to guess
- Memorability
- Easy to forget passwords that arent frequently
used - Difficult to remember secure passwords with a
mix of upper lower case letters, numbers, and
special characters - Reuse
- Too many passwords to remember
- A previously used password is memorable
- Sharing
- Often unintentional through reuse
- Systems arent designed to support the way people
work together and share information
12Mnemonic Passwords
Four
F
Four
score
s
and
a
and
years
y
,
,
seven
s
seven
ago
a
our
o
Fathers
F
First letter of each word (with punctuation)
4sasya,oF
4sa7ya,oF
4s7ya,oF
Source Cynthia Kuo, SOUPS 2006
13The Promise?
- Phrases help users incorporate different
character classes in passwords - Easier to think of character-for-word
substitutions - Virtually infinite number of phrases
- Dictionaries do not contain mnemonics
Source Cynthia Kuo, SOUPS 2006
14The Problem?
- Goodness of mnemonic passwords unknown
- Yan et al. compared regular, mnemonic, and
randomly generated passwords - Used standard (non-mnemonic) dictionary
- Effectively evaluated whether mnemonic passwords
contained dictionary words
Source Cynthia Kuo, SOUPS 2006
15Mnemonic password evaluation
- Mnemonic passwords are not a panacea for password
creation - No comprehensive dictionary today
- May become more vulnerable in future
- Many people start to use them
- Attackers incentivized to build dictionaries
- Publicly available phrases should be avoided!
- C. Kuo, S. Romanosky, and L. Cranor. Human
Selection of Mnemonic Phrase-Based Passwords. In
Proceedings of the 2006 Symposium On Usable
Privacy and Security, 12-14 July 2006,
Pittsburgh, PA.
Source Cynthia Kuo, SOUPS 2006
16Password keeper software
- Run on PC or handheld
- Only remember one password
17Single sign-on
- Login once to get access to all your passwords
18Biometrics
19Graphical passwords
20Forgotten password mechanism
- Email password or magic URL to address on file
- Challenge questions
- Why not make this the normal way to access
infrequently used sites?
21Convenient SecureID 1
- What problems does this approach solve?
- What problems does is create?
Source http//worsethanfailure.com/Articles/Secur
ity_by_Oblivity.aspx
22Convenient SecureID 2
- What problems does this approach solve?
- What problems does is create?
Sources http//fob.webhop.net/
23Browser-based mutual authentication
- Chris Drakes Magic Bullet proposal
- http//lists.w3.org/Archives/Public/public-usable-
authentication/2007Mar/0004.html - User gets ID, password (or alternative), image,
hotspot at enrollment - Before user is allowed to login they are asked to
confirm URL and SSL cert and click buttons - Then login box appears and user enters username
and password (or alternative) - Server displays set of images, including users
image (or if user entered incorrect password,
random set of images appear) - User finds their image and clicks on hotspot
- Image manipulation can help prevent replay
attacks - What problems does this solve?
- What problems doesnt it solve?
- What kind of testing is needed
24Types of access control
- Discretionary access control
- Distributed, dynamic, users set access rules for
resources they own and can delegate access to
others - Role-based access control
- Centralized admin assigns users to roles and sets
access rules based on roles - And many others that vary
- discretionary/mandatory
- centralized/distributed
- granularity
- grouping
25Access control usability problems
- Admins, large organizations understanding large
access control policies - Someone in marketing changed a policy and now we
cant figure out why people in sales no longer
have access to a document - Who has access to this document anyway?
- End users creating and understanding policies
- Examples File system permissions, Grey,
Perspective, privacy rules - Home users want to share some files with some
other users, but dont want to share everything
26Policy conflicts
- Given
- Alice is in GroupA and GroupB
- FileQ is in FolderX
- What types of conflicts might occur?
- Direct conflict
- Alice allowed access to FileQ
- Alice denied access to FileQ
- Group/group conflict
- GroupA allowed access to FileQ
- GroupB denied access to FileQ
- User/group conflict
- Alice allowed access to FileQ
- GroupA denied access to FileQ
- File/directory conflict
- Alice allowed access to FileQ
- Alice denied access to FolderX
- 2-way conflict
- Alice allowed access to FileQ
- GroupA denied access to FolderX
27How can conflicts be resolved?
- Default rule deny/allow takes precedence
- Ordered rules policy author sets order
- Ordered rules most recent first/last
- Specificity most/least specific takes
precedence - Weighted rules policy author assigns weights
- Exceptions policy authors defines exceptions
(essentially a partial ordering) - Combination