28.02.2014 Views

Internet & Intranet Security Management - Risks & Solutions

Internet & Intranet Security Management - Risks & Solutions

Internet & Intranet Security Management - Risks & Solutions

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

• User authentication. The users who communicate have to verify their identity. This is particularly<br />

important for e-commerce transactions when a merchant wants to ensure that a customer is indeed the<br />

authorized user of a credit card.<br />

• Data origin authentication. When a user A receives a message from a user B, then user A has to<br />

ensure that the received message is from user B and vice versa (originality).<br />

Many methods are used to provide authentication services. Some are based on cryptographic<br />

techniques and others are based on biological characteristics such as fingerprints. The most important<br />

techniques based on cryptographic techniques are digital signatures (certificates) and username/password<br />

schemes.<br />

The HTTP/1.1 provides two simple user-name/password-based<br />

Figure 7.<br />

HTTP challenge-response authentication mechanism<br />

mechanisms for user authentication and for access control: Basic authentication access scheme and<br />

digest access authentication scheme. The Web server provides access to protected and unprotected<br />

resources. For protected resources, the server requires clients to authenticate themselves and replies<br />

to a client's HTTP request with a ''401 Unauthorized" status code and an authentication challenge<br />

included in a "WWW-Authenticate" header field. The client may then resubmit the request including<br />

the authentication information in an "Authorization" header field (see Figure 7).<br />

This header field contains at least an indication of the required authentication method (Basic or<br />

Digest) and a server specified realm. On the server side the realms are used to identify the resources<br />

to be protected. On the client side a realm is displayed to users so they know which user-name and<br />

password to use when the client prompts the user for the user-name and password.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!