3.8 Authentication & Authorization Flashcards
Define password key
A physical device that must be plugged into a USB port to authenticate
Advantages of using a password vault (3)
- More secure to have multiple passwords to access different services than a single password SSO
- Vault is encrypted to harden access in case it is compromised
- Portable - users can access it from nearly any location
How is HSM implemented for enterprise security?
Hardware-based device that provides centralized storage and management of all the keys used by an enterprise, can be used for encryption and to generate secrets or private keys
Define Knowledge based authentication (KBA)
Asks predefined question that only the true person would know or looks up data to ask a person
2 Types of KBA
- Static - a preconfigured question/answer
- Asks questions based on public or private information, such as what was the street number of house you lived in previously
Define PAP authentication (2)
- Password authentication protocol
- No encryption - plaintext
Define CHAP (2)
- Challenge Handshake Authentication Protocol
- Encrypted authentication
Define MS-CHAP (2)
- Microsoft’s CHAP implementation
- MS-CHAP & MS-CHAP V2 should not be used due to weak encryption
Name 3 secure authentication protocols used with PPTP
- L2TP
- IPsec
- 802.1X
Define TACACS+ (2)
- Terminal Controller Access-Control System
- AAA alternative to RADIUS
Define Kerberos (3)
- Most complex and robust AAA
- Provides SSO capabilities
- Uses mutual authentication between client & server
Define Security Assertion Markup Language (SAML) (2)
- Provides both authentication and authorization
- Third-party (Federated) authentication & authorization
Define 802.1X (3)
- Network Access Control - authenticates access to use network
- Commonly integrated with EAP
- Commonly used for wireless networks, but can be used for wired as well
Define OAuth and OpenID
- Typically used in conjunction
- OpenID provides authentication and OAuth provides authorization
Define MAC model for access control (4)
- Mandatory Access Control
- Separate security levels are configured and then all objects are assigned a security level
- Users are all assigned a security level and can access objects at or below their security level
- Common in highly secured organizations or government