SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : Ascend Communications (ASND)
ASND 220.42+4.9%Dec 12 9:30 AM EST

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: Glenn D. Rudolph who wrote (32805)2/1/1998 6:40:00 PM
From: Gary Korn   of 61433
 
2/2/98 CommunicationsWeek 31 (see BOLD)
1998 WL 2380031
InternetWeek
Copyright 1998 CMP Publications Inc.

Monday, February 2, 1998

700

Bandwidth

Technology Primer

Remote Access Authentication Coming Of Age
Salvatore Salamone

The booming growth in telecommuting and the need to support more
remote workers are making life tough for IT managers.

Besides the usual tasks of maintaining remote access server (RAS)

equipment, managers often find their time consumed by administering
access rights and authentication privileges on several geographically
dispersed RASes at the same time.

Enter the Remote Authentication Dial In User Service.

RADIUS is a commonly used authentication system. Most remote access
equipment vendors, including 3Com Corp., Ascend Communications, Bay
Networks, Livingston Enterprises Inc. and Shiva Corp., support RADIUS in
their RASes. Additionally, Microsoft now includes RADIUS support as part
of its Windows NT Routing and Remote Access Server software.


For IT managers, the main attraction of RADIUS is that it lets them
simplify administration of user authentication by keeping a central
database of access rights.

"We used to go crazy trying to keep access rights current on different
pieces of equipment," said Arnold Lafreniere, a network administrator at
Levinton Electronics Corp., an electronics component manufacturer.
"Every time someone changed jobs, left the company, or traveled and
called in from the road, we had to change access rights on two or three

RASes."

RADIUS avoids such problems. IT managers can use a single RADIUS
server to authenticate users dialing into multiple RASes. With RADIUS,
IT managers maintain a single authentication database. All users
dialing into a network are authenticated against this database.

For such centralized authentication to work, RASes must securely
communicate with a RADIUS server and verify that the user meets certain
conditions before allowing the user to gain access to the network.

The process of authentication is transparent to the user dialing in.
When a user places a call into a RAS, a Point-to-Point Protocol (PPP)
session is initiated. The RAS takes authentication information, such as
a user name and password, and passes this information to the RADIUS
server.

If the user is in the database and has access privileges to the
network, the RADIUS server signals the RAS that it is OK to continue the
process.

At the same time, the RADIUS server also sends what is called profile
information about the user to the RAS. The profile can include
information such as the user's IP address, the maximum amount of time
the user can remain connected to the network and the phone number the
user is allowed to dial to access the network.

The RAS takes this information and checks to make sure the call meets
the criteria of the checklist items. If the conditions are met, the PPP
negotiation with the caller is completed and the user is granted access.
If the user does not meet the conditions-say the person called using a
number reserved for other people in the company-the call is terminated.

A single RADIUS server can support all the RASes in a corporation.
This lets a manager set access policies and user access privileges once
and apply them no matter which RAS the user calls in on.

Using The Data

Depending on the level of security an organization wants to maintain,
IT managers have two choices for handling the transaction between the
user and the RAS.

PPP supports both the Password Authentication Protocol (PAP) and the
Challenge Handshake Authentication Protocol (CHAP).

PAP is easier to use but offers lower security. With PAP, users
typically send passwords to the RAS unencrypted in plain text format.
The RAS encrypts the password and sends it to the RADIUS server, which
decrypts the password. The RADIUS server then validates the password
against its database, against a NetWare Bindery or Novell Directory
Service or against a Microsoft NT Domain or Workgroup list.

If a manager does not want to have users sending passwords unencrypted
to the RAS, CHAP is the option. With CHAP, the RAS challenges the user
to prove his or her identity. This is accomplished by the RAS generating
a random number and sending it to the user. The user's PPP client
creates what is called a digest that encrypts the password using the
"challenge." This digest is sent to the RAS, which then passes it to the
RADIUS server. The RADIUS server creates a digest using its copy of the
user's password.

If the two digests match, it means the user is indeed who he or she

claims to be and is authenticated by the RADIUS server. The benefit of
this approach is that a user's password never passes unencrypted over
the dial-up portion of the link.

Regardless of the method used to authenticate the user, the RADIUS
server then returns a profile of the user's attributes to the RAS. An IT
manager creates the attributes by defining a set of requirements for
each user or group of users to access the network. This might include
such things as the time of day a user can access the network or whether
the user is allowed to use an ISDN connection. This set of criteria for
access is passed from the RADIUS server to the RAS, where specific
conditions of each call are checked.

RADIUS' central database of access information is ripe for use in
other ways. But until recently, it was considered too hard to get at to
be of any use.

For instance, while RADIUS servers track a user's logon and logoff
information, it has been hard to correlate that information across
multiple RASes because there has been no simple way to extract and
compare just that portion of a much larger RADIUS accounting database.

IT managers who wanted to use the information for other purposes, like
tracking usage patterns to aid in planning equipment upgrades, needed to
write customized programs.

Management Control

Within the past three months, several RAS companies have taken steps
to change this situation.

In December, Livingston Enterprises introduced the RADIUS
Authentication Billing Manager (ABM), a line of remote access management
servers that take the usage information from a RADIUS database and link
it with business processes such as customer billing and network trend
analysis. Livingston's RADIUS ABM includes a suite of applications such
as Trend Builder and Integrated Billing applications.

Other vendors marry the information in a RADIUS database to security
features in their own products to give a manager more targeted access
control. For instance, Ariel Corp. combines user authentication
information in a RADIUS database with a caller ID feature in its RASCAL

line of RASes to offer a call-blocking feature. Essentially, the RASCAL
determines the phone number from which a user has dialed into the RAS.
If that number does not match the authorized numbers in RADIUS from
which that user is allowed to dial in, the call is automatically
blocked.

Such tools are likely to become more important as companies want to
take more control over their networks.

"There's a wealth of untapped information in RADIUS databases,"
Lafreniere said.

For example, RADIUS includes a number of standard accounting and
reporting features. A RADIUS server, for example, can maintain a history
of all user sessions. This could include a record of the start and stop
time and duration of every session for each user.

A manager might use this information to track total connect time and
peak connection periods to help identify usage patterns. Or, the
information could be used by an IT department to bill back business
units for usage of the network.

Word Count: 1217
2/2/98 COMMWK 31
END OF DOCUMENT
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext