4.0 - Identity and Access Management Flashcards
1
Q
Identification
A
- Identification occurs when users claim or profess their identity with an identifier such as a username or email address
2
Q
Authentication
A
- Authentication occurs when a user proves their claimed identity (username, email address) with some type of credential such as a password, PIN, etc. (something you know)
- When a person’s identity is established with proof and confirmed by a system
3
Q
Authorization
A
- Authorization occurs when a verified user is given access to resources based on the level of their proven identity
- (granting a user permission to read data in a shared folder)
- (granting a user access to certain parts of the building)
4
Q
Accounting
A
- Accounting is used to track user activity and record the activity in logs
- log and track user activity, which data is being accessed, log in/log out times, computer usage
5
Q
Federation
A
- requires a federated identity management system that all members of the federation use
- Members of the federation agree on a standard for federated identities and then exchange the information based on the standard
- a federated identity links a user’s credentials from different networks or operating systems, but the federation treats it as one identity
6
Q
Single sign-on
A
- allows users to log on or access multiple systems by providing credentials once once
- SSO increases security because the user only needs to remember one set of credentials and is less likely to write them down
7
Q
Transitive Trust
A
- creates an indirect trust relationship between different parties
- within an LDAP-based network, domains use transitive trusts for single sign-on
8
Q
LDAP
A
- Lightweight Directory Access Protocol specifies formats and methods to query directories such as Active Directory
- Windows Active Directory domains and Unix realms use LDAP to identify objects in query strings
- LDAP is an extension of the X.500 standard that Novell and Microsoft Exchange Server used
- Windows Active Directory used LDAP to query its directory of objects (users, computers, and groups)
- uses TCP port 389
9
Q
Kerberos
A
- network authentication protocol within a MS Windows AD domain or a Unix realm
- It uses a database of objects such as Active Directory and a Key Distribution Center (KDC) or Ticket-granting Tickets (TGT) server to issue timestamped tickets that expire after a certain time period
- Tickets provide authentication for users when they access resources such as files on a file server
- Uses symmetric-key cryptography to prevent unauthorized disclosure and to ensure confidentiality
- Symmetric-key cryptography uses a single key for both encryption and decryption of the same data
- uses UDP port 88
10
Q
TACACS+
A
- terminal access controller access-control system plus (TACACS+) is the Cisco alternative to RADIUS
- Provides two security benefits over RADIUS
- encrypts the entire authentication process and uses multiple challenges and responses between the client and the server
- can interact with kerberos
- considered a AAA protocol since it provides all 3 services
11
Q
CHAP
A
- challenge handshake authentication protocol also uses point-to-point protocol (PPP) and authentication remote users
- client and server both know a shared secret (similar to a password) but the secret isn’t sent in plaintext
- secret is hashed by the client after combining it with a nonce (number used once) provided by the server
12
Q
PAP
A
- password authentication protocol is used with point-to-point protocol (PPP) to authenticate clients
- PAP sends passwords over a network in cleartext
13
Q
MSCHAP
A
- microsoft challenge handshake authentication protocol (MSCHAP) supported up to windows 95. improved to MS-CHAPv2
- MS-CHAPv2 requires mutual authentication between the client and the server
14
Q
RADIUS
A
- remote authentication dial-in user service (radius) is a centralized authentication service
- can also be used as an 802.1x server
- uses the user datagram protocol (UDP) which is best-effort delivery instead of TCP which is guaranteed delivery
- only encrypts the password, not the entire authentication process
- considered a AAA protocol since it provides all 3 services
15
Q
OpenID Connect
A
- OpenID Connect works with OAuth 2.0 and it allows clients to verify the identify of end users without managing their their credentials
- used to to authenticate users in a federated identity management system
- is easier to implement than SAML but SAML is more efficient