What is pre-authentication?
Pre-authentication is a security mechanism that verifies identity before access is granted. The term is used in two main contexts:
-
Network and application security
Here, pre-authentication adds a layer in front of applications and services. This often involves a firewall, security gateway, or application delivery controller (ADC), and may include mechanisms such as multi-factor authentication, certificate validation, or IP checks.
The goal is to make this layer as invisible as possible for the user, by combining strong security with a seamless experience. This is often achieved through Single Sign-On (SSO), so users only notice extra security when truly needed.
Analogy: Like a guard at the door who checks your ID before you even get to see what’s inside – but without meeting multiple guards along the way.
-
Kerberos pre-authentication
In the Kerberos protocol, pre-authentication protects against offline password attacks. Before a user can obtain a ticket from the Key Distribution Center (KDC), they must prove they already know the secret key (derived from their password). This is done by sending a timestamp encrypted with the key.
Analogy: Like applying for a passport – you must present valid ID before the passport office even starts processing and issuing the passport.
Examples
-
A user tries to open a web application. Before the login screen appears, they pass through a pre-authentication layer provided by a security gateway. Thanks to SSO, the user doesn’t need to enter another password, as their identity is already confirmed.
-
A client sends a request to the Kerberos KDC. Before the KDC issues a ticket, the client must send an encrypted timestamp that proves knowledge of the user’s key.
Sicra and pre-authentication
Sicra delivers pre-authentication solutions both at the application/network level and within Kerberos-based identity environments. This way, organizations achieve both strong protection and a seamless user experience.
Services
Learn more about "Firewall" here >
Learn more about "Application delivery controller" here >
Learn more about "Zero Trust architecture" here >
Learn more about "Access management – Identity and access management (IAM)" here >
Learn more about "Multi-factor authentication" here >
Related terms: Firewall, Zero Trust, Multi-factor authentication (MFA), Conditional Access, Identity security, ADC, Cybersecurity, SSO, Microsoft