Page 230 - DCAP311_DCAP607_WIRELESS_NETWORKS
P. 230
Wireless Networks
Notes In a similar fashion a system administrator can use authentication load module names for
the SYSTEMattribute.
Example: When SYSTEM attribute is set to SYSTEM=KRB5files OR compat,
the AIX host will first try a Kerberos flow for authentication and if it fails, then it will try
standard AIXauthentication.
SYSTEM and registry attributes are always stored on the local file system in the/etc/security/
user file. If an AIX user is defined in LDAP and the SYSTEM and registry attributes are set
accordingly, then the user will have an entry in the /etc/security/user file.
The SYSTEM and registry attributes of a user can be changed using the chuser command.
Acceptable tokens for the SYSTEM attribute can be defined in the /usr/lib/security/methods.
cfgfile.
Notes The root user is always authenticated by means of the local system security file.
The SYSTEMattribute entry for the root user is specifically set to SYSTEM=compat in the/
etc/security/user file.
Alternative methods of authentication are integrated into the system by means of
the SYSTEMattribute that appears in /etc/security/user. For instance, the Distributed Computing
Environment (DCE) requires password authentication but validates these passwords in a manner
different from the encryption model used in etc/passwd and /etc/security/passwd. Users who
authenticate by means of DCE can have their stanza in /etc/security/user set to SYSTEM=DCE.
Other SYSTEM attribute values are compat, files, and NONE. The compat token is used
when name resolution (and subsequent authentication) follows the local database, and if no
resolution is found, the Network Information Services (NIS) database is tried. The files token
specifies that only local files are to be used during authentication. Finally, the NONE token
turns off method authentication. To turn off all authentication, the NONE token must appear in
the SYSTEM and auth1 lines of the user's stanza.
Notes The root user is always authenticated by means of the local system security file.
The SYSTEMattribute entry for the root user is specifically set to SYSTEM = "compat" in /
etc/security/user.
14.1.2 Creating Strong User Authentication
The most common solution approaches that are used today involve, in more generalized terms,
various forms of enhanced shared-secret and/or multifactor authentication.
Enhanced shared-secret authentication refers to extensions of conventional knowledge-based
(single-factor) authentication—for example, additional passwords, site keys, preregistered
graphical icons to support mutual authentication, challenge-response, randomized code
selections that are based on input patterns, CAPTCHA, and so on.
Multifactor authentication refers to a compound implementation of two or more classes of
human-authentication factors:
z z Something known to only the user—Knowledge-based (for example, password, pass
phrase, shared secrets, account details and transaction history, PIN, CAPTCHA, and so
on).
224 LOVELY PROFESSIONAL UNIVERSITY