Skip to the content.

Network Authentication Protocols

Network Authentication Protocols

Network authentication protocols are mechanisms or sets of rules that ensure that users or devices can securely prove their identity to access network resources or services.

They ensure that only authorized users or devices can access a network, reducing the risk of unauthorized access and enhancing security.

PAP

PAP (Password Authentication Protocol) is a basic authentication protocol that has been largely replaced by more secure methods. Here’s an overview of its characteristics:

MS-CHAPv2

MS-CHAPv2 is a more secure version of the Challenge-Handshake Authentication Protocol, designed to provide enhanced security in network environments.

NTLM

NTLM is a Microsoft proprietary authentication protocol that has evolved over time to enhance security in network environments, though it is now largely replaced by more secure protocols like Kerberos.

Kerberos

Kerberos is a network authentication protocol that uses a ticket-based system to secure communications, widely used in enterprise environments.

Components include:

EAP

EAP (Extensible Authentication Protocol) is a flexible authentication framework used in network access protocols. It supports multiple authentication methods and is commonly used in wireless networks and point-to-point connections.

Examples:

EAP Variants

All variants are considered cross-platform, except for LEAP.

LDAP

LDAP (Lightweight Directory Access Protocol) is a protocol designed for accessing and managing directory information in a network.

Supports:

IEEE 802.1X

IEEE 802.1X is a standard for port-based network access control, ensuring that only authenticated devices can access the network.

More details can be found here: IEEE 802.1X Protocol

RADIUS

RADIUS (Remote Authentication Dial-In User Service) is a networking protocol that provides centralized Authentication, Authorization, and Accounting for users who connect and use a network service.

Components:

Variations:

How it works:

TACACS+

TACACS+ (Terminal Access Controller Access-Control System Plus) is a protocol used for centralizing authentication, authorization, and accounting management for users who access network services.

Identity Federation

A system where multiple organizations share authentication data, allowing users to access resources across organizational boundaries without re-authenticating.

Key Concepts

Benefits of Identity Federation

How it works

  1. Login initiation - User logs in
  2. User is redirected to an identity provider
  3. IdP will authenticate the user
  4. IdP generated an assertions (like a token)
  5. User is returned to a service provider with the assertion
  6. Verification and access

Use Cases

Identity Federation Methods

SSO

SSO (Single Sign-On) allows users to authenticate once and gain access to multiple applications without needing to re-enter credentials, streamlining the user experience.

Protocols used:

OAuth

OAuth (Open Authorization) is a standard for token-based authentication and authorization, enabling secure interactions between services without exposing user credentials.

How it works:

SAML

SAML (Security Assertion Markup Language) is an open standard used for exchanging authentication and authorization information between Identity Providers (IdPs) and Service Providers (SPs).

OIDC

OpenID Connect (OIDC)


Back to main page