Authentication Flashcards

1
Q

Authentication

A

The process of verification that an individual or entity is who they/it claims to be.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Authentication Factors

A
  1. Knowledge.
  2. Ownership.
  3. Inherence.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Knowledge Authentication Factors

A

Something the user Knows:

Password, PIN, Security Question.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ownership Authentication Factors

A

Something the user has:

Wrist band, Credit Card, ID, Security Token.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Inherence Authentication Factors

A

Something that the user is:

Fingerprint, retinal pattern, facial recognition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Entropy

A

Is a measure of how unpredictable a password is based on the selection process. Entropy is not a measure of the password itself, but what it could have been. The higher the Entropy the stronger the password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Password Rules

A
  1. Password must have 3 of the following 4 complexity rules: at least 1 upper case character, at least 1 lower case character, at least 1 digit, at least 1 special character.
  2. At least 10 characters.
  3. Set maximum length, current recommendation is 128 characters.
  4. Not more than 2 identical sequential characters.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Authentication Process

A
  1. Credentials only transported by POST using TLS (HTTPS).
  2. Error messages should be generic and not identify the source of the failure.
  3. Prevent Brute Force Attacks.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

JWT (JSON Web Tokens)

A

On login, the server generates a Secure Token with a JSON payload and a signature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Claim

A

The payload containing information about the user, when it expires, and what the user is allowed to do (Authorizations).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Parts of a JWT Token

A
  1. Header.
  2. Payload.
  3. Signature.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Header JWT Token

A

Contains the Algorithm used to generate the Token and the type of Token generated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Payload JWT Token

A

Contains the user’s “claim”. Who they are and what they can do.

  1. sub (Subject) - whom the token is for (often the username).
  2. auth (Authorities/Roles) - What the user is authorized to do in the application.
  3. exp (Expires) - Timestamp of when the token expires.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Signature JWT Token

A

Contains information the API server can use to verify that the JWT token is valid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Authorization

A

Is the process of giving users to access specific resources or functionality in an application. Authorities or Access Controls determine what privileges a user has within an application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Role-Based Authorization

A
  1. Accessed decision based on the individual’s responsibilities within an organization ( Role ).
  2. Easy to understand and administer (Manager vs Employee, Doctor vs Lab Tech vs Patient).
17
Q

Permission-Based Authorization

A
  1. Accessed decision based on the identity of the individual.
  2. Applies when permissions need to be user-specific ( user can see only their 401K or a paycheck, Only Aniyah can DROP the Customer Table).
18
Q

Difference between Authorization and Authentication

A

Is the process of giving users to access specific resources or functionality in an application and The process of verification that an individual or entity is who they/it claims to be.