19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Hardware & Software Remarks<br />

____________________________________________________________________ .........................................<br />

- <strong>The</strong> authentication server verifies the user data and passes the results of the<br />

validation process to the logon process.<br />

- If the user has been successfully authenticated, access is now granted to the<br />

(access) network.<br />

Through the use of central authentication servers it is possible to ensure on the<br />

one hand that the authentication data is consistently administered and on the<br />

other hand that better authentication mechanisms can be used than are<br />

supported as standard by the operating systems. In particular, smart card and<br />

token-based mechanisms should be mentioned here. Depending on the system,<br />

these generate, for example, one-time passwords which are shown on a<br />

display and which the user must specify as password.<br />

For medium-sized and large networks the use of authentication servers is<br />

especially recommended in the RAS area as these offer a significantly higher<br />

degree of security during user authentication. However, it should be noted that<br />

these servers also have to be administered and maintained. An authentication<br />

server must be positioned in the network in such a way that performance is<br />

good while at the same time protection is provided against unauthorised<br />

accesses.<br />

Additional controls:<br />

- Is the external authentication system supported by the operating system and<br />

the RAS system?<br />

- Does the RAS client software allow use of a smart card reader for smart<br />

card-based authentication systems?<br />

- What security mechanisms are offered by the external authentication<br />

system?<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!