4.6 Given a scenario, implement and maintain identity and access management Flashcards
1
Q
Identity and Access Management (IAM)
A
-
Four Main IAM Processes:
-
Identification:
- User says who they are (e.g., with a username or email).
-
Authentication:
- Confirms identity with passwords, biometrics, or multi-factor authentication (MFA).
-
Authorization:
- Decides what users are allowed to do or access, often using role-based access control (RBAC).
-
Accounting (Auditing):
- Tracks activities like logins, actions, and changes to find problems and ensure rules are followed.
-
Identification:
-
Key IAM Concepts:
- Provisioning and Deprovisioning
- Identity Proofing: Checks who someone is before creating their account, using details or documents.
- Interoperability: Makes sure different systems work together using standards like SAML or OpenID Connect.
- Attestation: Regularly checks that user accounts and access rights are correct and up-to-date.
2
Q
SSO Protocols
A
- LDAP: Effective for directory services but limited in SSO across external applications. Provides both authentication and authorization.
-
SAML: Ideal for SSO in multinational corporations; enables single credential use across multiple cloud-based applications. Uses XML and web.
- Facilitates secure integration between identity provider and external service providers
- Provides a seamless user experience across diverse applications
-
OAuth (Open Authorization)
- Purpose: Token-based access for third-party apps without sharing passwords.
- Function: Uses JWT (JSON Web Tokens) to securely transfer data.
- Use Case: Popular in RESTful APIs for sharing user data with external services (e.g., Google Login).
- Security: Authorization server provides tokens; app gets limited access based on user consent.
- Key Point: Primarily used for auTHOrization, not authentication.
- Kerberos: Strong for internal network authentication but lacks versatility for cloud-based SSO
-
Key Differences:
- LDAP: Centralized storage for both authentication and authorization (internal networks).
- SAML: Authentication for SSO, SSO for web-based applications. Used in enterprises.
- OAuth: Authorization through tokens (external services, limited access). E.g. OAuth pop-up authorizing the Doodle app access to Google Calendar
3
Q
Federation
A
- What it is: Links identities across multiple organizations.
-
How it works:
- Users log in once with their organization’s credentials and access external services (e.g., partner or supplier apps).
- Trust relationship between different organizations allows shared authentication.
- Use Case: Accessing services across different companies (e.g., a supplier portal). This is in contrast with SSO, which could be email, HR, and CRM systems.
4
Q
Privileged Access Management (PAM)
A
-
PAM: Controls and monitors privileged access, preventing misuse
- Ensures least privilege for tasks, reducing breach risks
-
Components of PAM
- JIT Permissions: Temporary admin access only for tasks, revoked after
- Password Vaulting: Secure password storage with MFA and audit trail
- Temporal Accounts: Short-term access, auto-disabled after use
- Could be used w/o knowing password
5
Q
Access Control Models
A
- MAC (Mandatory Access Control): typically in environments with a high level of data security. Uses matching security labels on users and objects to grant or block access.. Also see SELinux (Security Enhanced Libux).
- DAC (Discretionary Access Control): Owners set access (e.g., File owner grants access to colleagues). Microsoft NTFS uses it.
- RBAC (Role-Based Access Control): Permissions by roles (e.g., Managers access reports, not HR data)
- RBAC Rule-Based Access Control: Uses approved rules (e.g., ACLs) that trigger on events to adjust permissions. E.g. You can configure a database rule to trigger a change permissions of Bart when the system recognizes that Marge is absent.
- ABAC (Attribute-Based Access Control): Access by attributes (e.g., User allowed only during office hours, of geo-data). Uses attributes defined in policies to grant access to resources. It’s commonly used in software-defined networks (SDNs).