3.8 - Given a scenario, implement authentication and authorization solutions. Flashcards
Authentication management
Password keys
Password vaults
TPM
HSM
Knowledge-based authentication
Authentication/authorization
Authentication/authorization- EAP
Authentication/authorization - Challenge-Handshake Authentication Protocol (CHAP)
Authentication/authorization - Password Authentication
Protocol (PAP)
Authentication/authorization - 802.1X
Authentication/authorization - RADIUS
Authentication/authorization - Single sign-on (SSO)
Authentication/authorization - Security Assertion Markup Language (SAML)
Authentication/authorization - Terminal Access Controller
Access Control System Plus (TACACS+)
Authentication/authorization - OAuth
Authentication/authorization - OpenID
Authentication/authorization - Kerberos
Access control schemes
Access control schemes - Attribute-based access control (ABAC)
Access control schemes Role-based access control
Access control schemes - MAC
Access control schemes - Rule-based access control
DAC
Discretionary access control
Used in most operating systems
– A familiar access control model
*
You create a spreadsheet
– As the owner, you control who has access
– You can modify access at any time
*
Very flexible access control
– And very weak security
Access control schemes - Conditional access
Access control schemes - Privileged access management
Access control schemes - Filesystem permissions