5-33.1 Identify Management Flashcards
1
Q
The process of proving identification to be genuine
A
Authentication
2
Q
The process of granting rights and permissions
A
Authorization
3
Q
Enterprise Unified Login Experience
A
SSO
4
Q
LDAP and Microsoft are two examples of the IdM technology
A
Directory Services
5
Q
The objective of this IdM technology supports the principles of least privilege and zero trust
A
Just-in-Time Privilege Access Management (JIT PAM)