Email-Based Identification and Authentication

Name Email-Based Identification and Authentication
Sources (Garfinkel, 2005)
Synonyms None
Context Provide a simple, self-service means for people to reset or recover credentials on systems that are less frequently used by leveraging authentication from systems that are more frequently used.
Problem How to establish users identity or authorization?
Solution Use the ability to receive email at a pre-determined address to establish one’s identity or authorization to modify account parameters.
Examples Example Source: (Garfinkel, 2005)
Implementation The web site should email a URL with an embedded token to the registered account; clicking on the URL takes the user to a web page that allows the password to be changed. The URL should expire after a short period of time and should not be usable more than once. Cookies can be used to require that the password be reset on the same browser that asked for the URL be sent. Send S/MIME-Signed Email should be used to decrease vulnerability to phishing attacks. Email-Based Identification and Authentication can even be used with desktop applications that use password to unlock encrypted data. When the encryption key is created, the user’s password is split and a share with a registered email address are stored with a trusted third party. If the user loses his or her local password, the second split can be sent to the web site, which can send a link to the registered email address that, when clicked, will cause the password to be reassembled and displayed.
Consequences In addition to allowing for easy password reset, Email-Based Identification and Authentication systems make it easy for those who have access to email systems to compromise additional accounts. This risk can be mitigated through the use of challenge questions (Just, 2005).
Dependencies None
Relationships [Leverage Existing Identification]
Principles [Convenience]
Guidelines None
Check lists None
Use cases None
Tags Email-Based Identification and Authentication, Authenticity, Authorization, Accessibility
Log history [12/21/2015]: Added to repository

References

Garfinkel, S.L., 2005. Design principles and patterns for computer systems that are simultaneously secure and usable (PhD thesis). Massachusetts Institute of Technology.

Just, M., 2005. Designing authentication systems with challenge questions, in: Cranor, L., Garfinkel, S. (Eds.), Security and Usability. O’Reilly.