With various authentication methods available, which exactly is the best? We delve into authentication, authorisation and discuss whether Basic Auth really is just too basic.
Before getting into the age-old authentication dilemma, let's start with an explanation of what authentication really is. Authentication and authorisation are, in fact, two different things that work together as a complete solution. Authentication refers to when a person is required to prove their identity as legitimate, and authorisation refers to permission to access certain resources. Basically, authentication relates to who you are, and authorisation relates to what you can do - simple.
But what exactly is basic authentication? Basic authentication, or basic auth , is a widely used method for collecting username and password information. It works by passing an authorization header with the string basic, indicating that it uses the basic authentication scheme Authorization: Basic
. The credentials (username and password) are then transmitted over the network and encoded with base-64 and joined by a single colon : .
Basic authentication is the easiest way of implementing access controls on web resources as it doesn't require any cookies, login pages or sessions - only the username and password. However, as it's only encoded with base-64, there is no confidentiality mechanism in place to protect the credentials from being sniffed and decoded.
As well as basic authentication, there are other ways to implement authentication such as bearer authentication, form-based authentication, API keys and OAuth.
Bearer authentication Bearer authentication is another HTTP authentication scheme that uses instead of credentials for authentication, understood as give access to the bearer of this token. The bearer token is a cryptic string generated by the server in response to a login request. The client must send this token in the Authorization header to access any protected resources Authorization: Bearer .
In some cases, the web application may use form-based authentication. Form-based authentication is not a formal standard of authentication, but a programming method of authentication used by developers to mitigate the risks associated with basic authentication. Most of the time, standard HTML form fields are used to pass the credentials in order to access the server. The server then validates the credentials and a session is tied to a unique key that is passed between the client and server.
API Keys Another common method used for authentication is API Keys. This is done by first generating a unique value and assigning it each user. This unique key may be generated using multiple criteria, such as IP address and location, or can be completely random by the server (but usually a long and unpredictable string). If a user wants access, they will need to provide their unique API key, and the server checks if it is the same key as before. A common precaution that API designers use is to make API keys for read-only data in to limit associated risks.
OAuth OAuth is a much newer, modern authentication scheme. Actually, there are two versions of OAuth: OAuth 1.0, first released in late 2007, and OAuth 2.0, released in late 2012. OAuth 1.0 provided a secure and strong mechanism of authentication but was ultimately replaced by OAuth 2.0 because it required a rather complicated implementation that was challenging for developers to implement.
By using OAuth, you can kill two birds with one stone as it's used for both authentication and authorisation. OAuth is a delegation protocol, where a user grants access to an application to perform certain actions on the user's behalf, . This simply means a secure third-party completes the and can recognise any suspicious attempts at the transaction stage, and users can share their private resources with a third party whilst keeping their own credentials a secret.
Our Conclusion As there are various authentication methods available, which exactly is the best? Honestly, it entirely depends on the situation. Most recommendations are usually OAuth due to its more secure nature, but it's still possible to use basic authentication when properly configured. If the authentication situation for an application is not as security demanding, and the developers want a simple authentication standard, then they can still make use of basic authentication. However, always use an SSL encryption in combination with basic authentication to secure user account information being transmitted over the network. If the functionality of the intended application is basic, then basic authentication is the way to go.
So, is Basic Authentication too basic? Not really, no.
lang: en_GB
Our Accreditations and Certifications
More from Eurofins
04/10/2023
In today's digital landscape, where businesses rely heavily on technology to...
19/09/2023
The global energy industry faces immense challenges:
Net Zero targets are driving many types of energy consumption to electricity at the point of use instead o...
31/08/2023
Resillion's best in class digital film restoration team has played an integr...
29/08/2023
As of May 2023 - Eurofins Digital Testing has changed its name to Resillion UK Limited, this name change has been reflected below in the press release from 2019...
25/08/2023
The following is based on real events; names and other details have been changed...
25/08/2023
Data Protection Impact Assessment, or DPIA for short. Even the acronym can strike fear into the hearts of those struggling with data protection compliance. But ...
22/08/2023
High data rates for residential users have always been hindered by the last-mile bottleneck, i.e., low data rates on the last mile of the access network towar...
22/08/2023
Your house is on fire what do you do first? You wouldn't call your insurance company to let them know your house was ablaze whilst watching the flames furt...
07/08/2023
On July 18th, 2023, the US Government announced a cybersecurity certification and labelling program for connected devices. This US Cyber Trust Mark will allow...
31/07/2023
by Dan Martland, Technical Testing Director
As we undertake many test automati...
31/07/2023
We previously released some guidance around the new Network and Information Security Directive (NIS2), which you can read here. NIS2 has many different areas to...
25/07/2023
By Rich Mort
In a past life, some years back, I attended a sales call as a Test Consultant with a fresh faced new go gettem' salesman who was determined t...
20/07/2023
Part of Citrix's solution line-up, Citrix ADC (formerly NetScaler ADC) is an application delivery and load balancing solution.
In March 2023, two of Resill...
17/07/2023
Recently, Resillion ran a webinar exploring the myths (or misconceptions) around...
14/07/2023
Hello everyone, my name is Jonas Claes, a 21-year-old coffee enthusiast and software aficionado from Belgium. I'm currently pursuing a degree in computer sc...
03/07/2023
By Glenn Koninckx, Technical Sales
Another face-to-face edition of the Wireless Power Consortium (WPC), this time in the beautiful city of Copenhagen, Denmark...
16/06/2023
NIST - the US National Institute of Standards and Technology has been examining labelling schemes for the cyber security of Consumer IoT products. Learn more ab...
13/06/2023
Recently Resillion ran a webinar with two of our Digital Transformation experts discussing how QA can drive digital transformation success. Although this works ...
09/06/2023
by Bill Chard Resillion was pleased to sponsor and attend the OpenADR Alliance's User Conference Europe, held in London on June 6th and 7th. Over two full d...
31/05/2023
In the first part of this series, I started looking at the key components of performance when building and scaling large cloud estates. Now, I'd like to del...
30/05/2023
Over the Winter of 2022/23, a series of significant events in the UK's electricity supply network featured in the national news. Run by the Electricity Syst...
25/05/2023
Your house is on fire what do you do first?
You wouldn't call your insurance company to let them know your house was ablaze whilst watching the flames fur...
10/05/2023
The digital revolution has brought myriad exceptional benefits, but the one I'd like to focus on is the unifying force of shared common services; the idea t...
30/04/2023
Tegenwoordig is het geen vraag meer of je wordt getroffen door een cyberaanval, ...
11/04/2023
The NIS, originally adopted in 2017, has already put certain measures on the table to improve the cybersecurity of European companies that are considered critic...
16/03/2023
Resillion is an enthusiastic supporter of Matter, the industry-unifying standard for Connected Things, and the Certification Scheme that will underpin its succe...
04/02/2023
Er zijn vele aanbieders van pentesten en onderwerpen als ethical hacking en cybersecurity in het algemeen zijn onderdeel van diverse (hogere) beroepsopleidingen...
24/01/2023
Resillion announced a new project funded by the UK Department of Business, Energy and Industrial Strategy (BEIS), focused on the performance testing of Demand S...
09/01/2023
London, 9 January 2023: We are pleased to announce the launch of our new company, Resillion. Combining the best-in-class expertise across Digital Testing, Cyber...
08/01/2023
Once again, on 28th January, it is Data Protection Day - hasn't it come round fast! This was originally created by the EU back in 2007 to raise awareness of...
12/12/2022
Den Haag, 13 december 2022 - In 2021 waren bijna 2,5 miljoen Nederlanders slachtoffer van online criminaliteit.* Via slecht beveiligde slimme apparaten kunnen h...
08/12/2022
The Hague, 13 December 2022 - In 2021, nearly 2.5 million Dutch people were victims of online crime.* Using poorly secured smart devices, hackers can penetrate ...
17/11/2022
Commissum is proud to announce that it has been CREST accredited for Security Operations Centre (SOC) services, further strengthening its current CREST accredit...
27/10/2022
Cyber Month is coming to an end, hasn't it absolutely flown by! During this 10th anniversary of cyber month, a plethora of activities have taken place acros...
20/10/2022
It's already the third week of this cybersecurity month . Time flies when you're having fun! That means it is also time for my third musing.
During C...
13/10/2022
Just because you don't immediately think of it, or can't physically see it, doesn't mean it doesn't exist - out of sight, out of mind' is a...
07/10/2022
The Connectivity Standards Alliance has this month released the Matter 1.0 standard, and a new certification program for products that connect with Matter.
Sma...
06/10/2022
All businesses have suppliers, fact. But have you ever considered the associated risk of a cyber-attack to your suppliers? Commonly known as either a supply cha...
04/10/2022
For World Testers Day, 9th September, we sat down with Programme Manager, Peter Shorrock, of our devices practice, to discuss how we make a difference in the br...
09/09/2022
Richard Mort, a senior consultant at independent Quality Assurance, (QA), testing and cyber security for software systems and devices company, Resillion, here e...
25/07/2022
Dr Bob Campbell recently wrote an article about the importance of ATSC 3.0 deplo...
22/07/2022
When asked about my job at - say - at a birthday party, or other social event and I tell them, people pause for a few seconds, then, usually with a puzzled expr...
18/07/2022
Resillion is partnering with the Connectivity Standards Alliance (CSA), to exten...
07/07/2022
Resillion, in partnership with the Consumer Technology Association (CTA) and National Association of Broadcasters (NAB), is pleased to announce the release of ...
09/05/2022
Protecting your organisation from outsider threat should be of utmost importance - effective cyber security measures keep both your data and systems safe and en...
07/04/2022
With various authentication methods available, which exactly is the best? We delve into authentication, authorisation and discuss whether Basic Auth really is j...
06/03/2022
This content is password protected. To view it please enter your password below:
Password:
lang: en_GB
Our Accreditations and Certifications...
12/10/2021
Eurofins are pleased to be working with WiSA , the Wireless Speaker and Audio Association to offer state-of-the-art testing for their award-winning SoundSend ...
27/08/2021
Hi! My name is Kevin Vissers and I've been working at Eurofins for six years, of which the last three years as Automation Engineer at one of our clients, KB...
19/08/2021
Hi! I am Andrew Taylor, Senior Test Consultant at Eurofins Digital Testing (UK).
My first proper' job was as a trainee COBOL Programmer for a major Govern...