4.6 Flashcards
IAM
Identity and access Management
Makes sure right individuals have right access to right resources for right reasons
Components of IAM
network access control
password management
digitial identity management
IAM Process
Identification - claiming identity
Authentication
Authorization - uses role based access control often
accounting
SSO
user authentication service using one set of credentials for multiple apps
Technologies for SSO
LDAP
OAUTH
SAML
Federation
Sharing and using identities across multiple systems or organizations
PAM
priviledged access management
- JIT permissions just in time
password vaulting
temporal accounts
Access Control Models
MAC mandatory access control
DAC discretionary
Role bAC role based
Rule based access control
ABAC attribute based
Identity Proofing
process of verifying a user’s identity before creating an account
drivers license verification or passport examples
Attestation
validating that user accounts and access rights are correct and up to date
involves regular reviews and audits or user accounts
Interoperability
ability of different systems and apps to work together to share information
in IAM it can involve SAML or OpenID Connect for secure authentication and authorization
Passkeys
Passwordless authentication
invovles creating a passkey by device authentication methods like fingerprint or facial recognization
LDAP
lightweight directory access protocol
used to access and maintain distributed directory information
can share user info across network devices
OAuth
open standard for token based authentication and authorization
allows third party services to access user account info without exposing passwords
often used in restful apps
uses json web tokens JWT
SAML
Security Assertion markup langugae
standard for logging users into apps based on sessions in another contect