fbpx Skip to content

Knowledge Byte: Multi-Factor Authentication in the Cloud

84057392_3382513485109192_2570936499621068800_n

Cloud Credential Council (CCC)

PCS-cover5

MFA provides an extra level of security that you can apply to your cloud computing environment. With MFA enabled when you sign into a cloud service, you are prompted for your username and password along with other authentication factors, such as an instant authentication token or biometric verification. Together, these multiple factors provide increased security for cloud computing resources.

Additional security credentials used within cloud services are:

  • Access keys (access key ID and secret access key): Access keys consist of an access key ID (AKIAIOSFODNN7EXAMPLE) and a secret access key (wJalrXUtnFEMI/K7MDENG/ bPxRfiCY).
    • You use access keys to sign programmatic requests that you make to your cloud computing service REST or Query APIs.
    • REST APIs use operations and other existing features of the HTTP protocol. For example, layered proxy and gateway components perform additional functions on the network, such as HTTP caching and security enforcement.
    • Access keys are also used with Command-Line Interfaces (CLIs). When you use a CLI, the commands that you issue are signed by your access keys, which you can either pass with the command or store as configuration settings on your computer.
    • Another type of access key is the X.509 system. Within this system, an organization wanting a signed certificate requests one through a certificate signing request (CSR).

Two examples of access keys are as given:

Key pairs: Key pairs consist of a public and private key, where you use the private key to create a digital signature and then your cloud computing services use the corresponding public key to validate the signature.

X.509 certificates: X.509 certificates contain a public key and additional metadata (like an expiration date that verifies when you upload the certificate). Each certificate is associated with a private key. When you create a request, you create a digital signature with your private key and then include that signature in the request, along with your certificate. The receiver (cloud provider) verifies that you are the sender by decrypting the signature with the public key that is in your certificate. Use X.509 certificates only when you must sign SOAP-based requests. In all other cases, use access keys.

Several cloud service providers offer MFA, either as soft (virtual) MFA or as hardware (physical) MFA, such as RSA or Gemalto devices.

Virtual MFA can be used in your:

● Smartphones

● Tablets

● Computers

Most Virtual MFA controls use an open Standard Time-Based One-Time Password (TOTP) algorithm. TOTP is an example of a hash-based message authentication code (HMAC).

Virtual MFA application supports the OATH standard for TOTP and it can easily be configured by scanning a QR code with your smartphone or by manually entering a configuration key provided. The app supports the ability to generate one-time passwords for one or more virtual tokens, making it easier for customers who require MFA protection for multiple identities.

TOTP combines a secret key with the current timestamp using a cryptographic hash function to generate a one-time password. The timestamp typically increases in 30-second intervals, so passwords generated close together in time from the same secret key will be equal.

To run TOTP on your web application, you need the plugins for SHA1 and SHA256 hashing algorithms.

Hardware MFAs (disconnected tokens) are of two types:

Sequence-Based Token

In a sequence-based token, the token may have a button that is pressed to switch it on and display a new passcode. The cumulative number of button pushes can be used as a challenge. The server, however, must assume that the button may have been pressed a number of times since the last actual use, and attempt the authentication with all likely numbers of button pushes.

Time-Based Token

In a time-based token, the token generally contains a quartz time source, allowing the absolute time to be used as the challenge and a new passcode to be displayed (usually) every 30 or 60 seconds. In this case, the authentication server must allow for a drift in the time source by trying the authentication with a previous and subsequent time as well as the current time. It can hence keep track of the drift in the clock.

Courses to help you get
results with

Sorry, we couldn't find any posts. Please try a different search.

Never miss an interesting article

Get our latest news, tutorials, guides, tips & deals delivered to your inbox.

Please enter your name.
Please enter a valid email address.
Please check the required field.
Something went wrong. Please check your entries and try again.

Keep learning

nick-fewings-5RjdYvDRNpA-unsplash

Is Digital Transformation Transforming?

Is Digital Transformation Transforming? 52% believe that, within the next three years, some part of their organization will have fundamentally changed the way it operates...
10

Pros and cons of working from home: how can we boost productivity?

The COVID-19 crisis gave us no choice in the Spring of 2020: it pushed us out of the offices and transformed our homes into working...
PCSA-666

Knowledge Byte: Moving Legacy IT to Cloud Computing

The question of how cloud impacts legacy IT is one that is brought up numerous times, yet often gets little to no clarification. The following...
Scroll To Top
Tweet
Share
Share