Back to Security Pattern Catalog
: Perimeter Security, Spoofing
A malicious attacker might try to impersonate a legitimate user to have access to the user's resources. This could be even more serious if the impersonated user has a high level of privilege.
How to prevent agents who are not allowed from entering the system?
Create a single point of access to receive the interactions of a subject and apply a protocol to verify the identity of the subject. Create a proof of identity if subject is successfully authenticated.
Centralized authentication service in RADIUS.
Single Access Point, Policy Enforcement Point
Last modified: May 05, 2012
and Maintained by: Munawar Hafiz