User Authentication

A Model for an Enterprise-wide User Authentication Service

January 18, 1998
April 8, 1998

This document discusses several aspects of user authentication for access to various networked services at the University of Kansas. Authentication is the process of verifying the identity of a user. For example, the university might like to make enrollment records available through a Web or other online system, but must restrict access to student records to authorized individuals. The first step in providing access is to establish the identity of the prospective user via some "authentication" process.

"Authentication accounts"

Several university offices typically build network resources that require their users to enter some kind of account name along with a password associated with the account, as a basic authentication. Ideally,

Here is a basic model of an approach to an authentication system. First we build a database containing "user authentication accounts" (UAAs), where each entry includes a user account name along with user information like a password, student number, etc. Then we build an "authentication server" that accepts (http-based??) requests for authentication in the form of an encrypted pair....account_name, password.... and responds "yes" if the pair of values match and "no" otherwise. This exchange would be encrypted though there are probably complexities of industrial-strength encryption here that must be considered.

To get an account, a user would come to the Computer Center or Strong Hall or some such location, present IDs and be assigned an account. The user could then manage the account ad lib....change passwords and whatever other information might be relevant.

Note that the "authentication accounts" described above authorize nothing. They are NOT for dial-in access, e-mail access, etc. However, they WOULD be used to authenticate a user applying for online services like an account on falcon, or access to student grades. For example, we currently give dial-in accounts to users who know a birth date that matches a student number. If we had an operating authentication system, we would allow students who know their authentication account name and password, to set up a dial-in account...or access any of a number of other resources as well.

Scaling problems

The major problem with this approach is scalability. To wit: If it takes a clerk only 1 minute to present IDs and enter desired password information, it would take about 116 hours or 3 weeks for 1 FTE clerk to process the roughly 7,000 students/faculty arriving each year. If the average registration time is 3 minutes it would take over 2 months.

There are a several possible approaches to this problem.