18.07.2013 Views

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 10: Setting Up Authentication<br />

Authentication overview<br />

Hardware<br />

authenticators<br />

S<strong>of</strong>tware<br />

authenticators<br />

276<br />

Strong authentication<br />

A basic premise <strong>of</strong> security is to positively identify who is accessing your<br />

networks. Strong user authentication performs this function and is generally<br />

desired for external-to-internal proxy connections. An authentication server,<br />

such as Secure Computing’s SafeWord PremierAccess, typically resides in the<br />

internal network burb. When a user attempts to log in, the authentication server<br />

displays a passcode prompt for the user.<br />

A passcode is a unique, one-time response that is generated for the user via a<br />

hardware or s<strong>of</strong>tware authenticator known as a token. Because the token<br />

generates a unique passcode for each log in attempt, they are immune to<br />

passcode sniffing or theft. Because the passcodes are generated by a<br />

cryptographic algorithm, they are essentially impossible to guess.<br />

When tokens are PIN-protected, this strong authentication method is known as<br />

two-factor authentication. That is, authentication is based on something the<br />

user knows (a PIN that allows access to the token) and something the user has<br />

(a token that generates unique passwords).<br />

The <strong>Sidewinder</strong> <strong>G2</strong> coordinates the passcode prompt and response process<br />

between the authentication server and the user. The authentication server<br />

maintains detailed information about user accounts and connection times.<br />

A hardware authenticator is a small, hand-held device that looks similar to an<br />

ordinary calculator. The hardware authenticator displays the proper log in<br />

response on a digital display. A hardware authenticator is platformindependent<br />

and can be used from any PC or workstation equipped for<br />

network communications.<br />

In contrast, a s<strong>of</strong>tware authenticator is installed directly on the user’s PC or<br />

workstation. It automates the response process, requiring the user only to<br />

enter a personal identification number (PIN). A valid PIN unlocks the s<strong>of</strong>tware<br />

authenticator, which then calculates and returns the proper log in response. An<br />

example <strong>of</strong> a supported s<strong>of</strong>tware authenticator is the SafeWord PremierAccess<br />

S<strong>of</strong>Token-II.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!