Public Key Authentication Protocols
Public Key Authentication Protocols
Several authentication protocols exist. None are 100 percent foolproof. Choose your
method carefully, however, and you will reduce the risk of hacking and data theft.
As more critical information is stored electronically, and as hackers become more and
more adept at theft, authentication becomes more important. Without it, losses can be
significant. For example, Deloitte experienced a data breach in 2017 that exposed client
email (including some tied to government agencies). Authentication may never keep
your information perfectly secure. But it can make theft harder to accomplish. Hackers
may move to a different target if your servers are too difficult to penetrate.
The five most common authentication methods companies use include the following:
1. Kerberos: If you work within the Windows environment, you've used this
protocol. The system leans on symmetric keys pulled from a centralized key
distribution center. While the protections are significant, Kerberos isn't perfect. In
2020, Kerberos stopped working after a system update.
2. LDAP: As we explained in a recent blog post, companies store usernames,
passwords, email addresses, printer connections, and other static data within
directories. LDAP is an open, vendor-neutral application protocol for accessing
and maintaining that data.
3. OAuth 2.0: If you've ever used a login from another site (like Facebook) to get
into a new site (like The New York Times), you've used OAuth 2.0. An application
pulls resources on your behalf, and you don't have to share credentials. This
system can also be hacked, as GitHub discovered in 2020.
Consider your:
Application needs. What systems and resources require access? How significant or
private are they?
Infrastructure. What protocols can you launch without overhauling your existing
system?
Effort. How much training or programming will you need before you can get
started?
Future. Can the system grow and change with your company?