Access Controls Flashcards
5 ways to authenticate
Something you know Something you have Something you do Something you are Somewhere you are (physical location)
This is also called identity proofing
802.1x
An IEEE (I triple E) standard that defined PNAC ( port based network access controls)
It is a form of port security, you can tie a port to a specific MAC address which protects against unauthorized devices connecting to the network
Components are a supplicant (end device) authenticator( switch or wap) and authentication server (Radius) server
DO NOT! confuse this with 802.11x which is a LAN/WLAN Protocol.
EAP
Extensible Authentication Protocol
Defines message formats 802.1x defines how EAP is encapsulated within messages
Kerberos
Authentication protocol that enables computers to prove their identity to each other securely.
The PC attempts to authenticate to the Ticket granting service(TGS), if accepted the TGS gives the PC a temporary ticket. The PC now takes the temporary ticket and gives it to the Key Distribution Center to get an access pass to whatever it needs (for example connecting to the AD domain controller)