Jump to content

Mutual authentication: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
Skippydo (talk | contribs)
m undo: spam
Undid revision 291554613 by Skippydo (talk)
Line 25: Line 25:
*[http://developers.sun.com/prodtech/appserver/reference/techart/mutual_auth.html Mutual Authentication for Web Services: A Live Example]
*[http://developers.sun.com/prodtech/appserver/reference/techart/mutual_auth.html Mutual Authentication for Web Services: A Live Example]
* [http://www.howtoforge.com/prevent_phishing_with_mutual_authentication How to prevent phishing with mutual authentication] - How to stop [[phishing]] with mutual authentication
* [http://www.howtoforge.com/prevent_phishing_with_mutual_authentication How to prevent phishing with mutual authentication] - How to stop [[phishing]] with mutual authentication
* [http://www.sestusdata.com Virtual Tokens]


[[Category:Authentication methods]]
[[Category:Authentication methods]]

Revision as of 21:37, 22 May 2009

Mutual authentication or two-way authentication (sometimes written as 2WAY authentication) refers to two parties authenticating each other suitably. In technology terms, it refers to a client or user authenticating themselves to a server and that server authenticating itself to the user in such a way that both parties are assured of the others' identity.

Typically, this is done for a client process and a server process without user interaction.

Mutual SSL provides the same things as SSL, with the addition of authentication and non-repudiation of the client authentication, using digital signatures. However, due to issues with complexity, cost, logistics, and effectiveness, most web applications are designed so they do not require client-side certificates. This creates an opening for a man-in-the-middle attack, in particular for online banking.

As the Financial Services Technology Consortium put it in its January 2005 report, "Better institution-to-customer authentication would prevent attackers from successfully impersonating financial institutions to steal customers' account credentials; and better customer-to-institution authentication would prevent attackers from successfully impersonating customers to financial institutions in order to perpetrate fraud."

See also

Examples

Some examples of two-way authentication include:

References