Are You Authenticating Application Users?


As we briefly discussed in my last blog, Application Delivery Controllers (ADCs) deploy at the intersection of the network and applications so they can act as sensors to changing user demands – detecting increased user latency, lack of available resources, availability or outage issues.  An additional functionality that many of our customers use ADCs for is to authenticate users before letting them connect to applications.

Why Authenticate?

Many application services are web-enabled and sometimes bundled in other composite applications via Application Programming Interfaces (APIs). Since these services are accessible over the web, they are open to malicious attacks.

There are many ways a malicious user can affect an application environment. Social engineering, like impersonating a user identity to access sensitive data, can be used to infiltrate an enterprise. It is also possible to reuse a validated, but hacked user credential to access an application.

As hackers probe network and application vulnerabilities to gain access to sensitive data, the prevention of unauthorized access needs to be multi-pronged as well.  To secure data that is in motion and at rest, it is important to prevent Denial-of-Service (DoS) Attacks at the perimeter and prevent rogue application ports/applications from running in the enterprise. Routine vulnerability assessment scans on applications and scanning source code for vulnerabilities can help this.

Authentic vs. Authorized

Another important aspect to preventing malicious access and preventing the breach of sensitive data is to validate users before they can access an application. There are two aspects to this – making sure that the user is “authentic” and that they are “authorized” to access the application.

 To prove user authenticity, the identity/credential must be validated against an identity store (LDAP, Active Directory, etc.). If seen for the first time or based on risk criteria, the user may also be challenged for additional factors – say to provide a passcode or a one-time password. It’s also important to make sure that the tokens that are generated after validation, sometimes used for single sign-on (SSO) are also secure.

Since ADCs are generally used to terminate user connections, data should be scrubbed to discover malicious application attacks prior to connecting user to an application. This method of authenticating users against an identity management system prior to accessing applications is one of the functionality that many of our customers routinely offload to ADCs.

In addition to validating access, sometimes applications also have to authorize access.  Is this user allowed to access a particular application or functionality – say for important financial data, or patient information? Many legacy applications are built with authorization code coded.

Even if your applications are deployed and working as designed, apply rigor to securing them to prevent breaches. Your practice should include DDoS prevention and mitigation, unauthorized ports and applications, encrypting data at rest and in motion, access and authorization enforcement, auditing and logging.

Click here to Learn More about the Expanding Role and Importance of Application Delivery Controllers

Prakash Sinha

Prakash Sinha is a technology executive and evangelist for Radware and brings over 29 years of experience in strategy, product management, product marketing and engineering. Prakash has been a part of executive teams of four software and network infrastructure startups, all of which were acquired. Before Radware, Prakash led product management for Citrix NetScaler and was instrumental in introducing multi-tenant and virtualized NetScaler product lines to market. Prior to Citrix, Prakash held leadership positions in architecture, engineering, and product management at leading technology companies such as Cisco, Informatica, and Tandem Computers. Prakash holds a Bachelor in Electrical Engineering from BIT, Mesra and an MBA from Haas School of Business at UC Berkeley.

Contact Radware Sales

Our experts will answer your questions, assess your needs, and help you understand which products are best for your business.

Already a Customer?

We’re ready to help, whether you need support, additional services, or answers to your questions about our products and solutions.

Locations
Get Answers Now from KnowledgeBase
Get Free Online Product Training
Engage with Radware Technical Support
Join the Radware Customer Program

CyberPedia

An Online Encyclopedia Of Cyberattack and Cybersecurity Terms

CyberPedia
What is WAF?
What is DDoS?
Bot Detection
ARP Spoofing

Get Social

Connect with experts and join the conversation about Radware technologies.

Blog
Security Research Center