Authentication & Authorization Flashcards

1
Q

RADIUS

A

Used for AUTHENTICATION & AUTHORIZATION purposes. Does NOT provide further access control. Uses UDP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

RADIUS Federation

A

Allows authentication to be SHARED without having to re-authenticate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

TACACS+

A

More reliable than RADIUS and uses TCP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

PAP

A

Username and password are sent in plaintext. NO PROTECTION. BAD.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CHAP

A

Better than PAP. Uses a one-way hashing function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

MSCHAP

A

Microsoft CHAP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

PAP, CHAP, and MSCHAP are old unsecure protocols.

A

Instead use MSCHAP with PEAP or L2TP/IPsec.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

802.1X (not to be confused with 802.11)

A

Provides standards for port-based access control. Facilitates the use of EAP, RADIUS, digital certificates, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SAML

A

An XML framework used for single sign-on AUTHENTICATION.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

OAuth

A

Provides API authorization between applications.
IMPORTANT: Doesn’t provide authentication, only authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

OpenID Connect

A

Used for consumer single sign-on for AUTHENTICATION.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Shibboleth

A

SAML-based federated identity solution that provides SSO capabilities. Just another SSO option.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Kerberos

A

Symmetric key authentication protocol. Uses TICKETS. If you see questions with tickets or ticket granting tickets, it’s talking about Kerberos.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Mandatory access control (MAC)

A

Often used in the government. Think SENSITIVE, SECRET, and PUBLIC, or Classified, Secret, and Top Secret.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Discretionary access control (DAC)

A

Allows individual resources to be made available or secured. Think of your privacy settings on YOUR social media accounts. You control what people see, at your DISCRETION.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Role-based access control (RBAC)

A

Access rights are assigned to roles. Example: A server at a restaurant doesn’t need access to security cameras, but security guards would have that access.

17
Q

Rule-based access control (also known as RBAC 🙃)

A

Controls are based on certain criteria like time of day, GPS, etc. Example: Users should only be logging in from the United States. That’s a rule.

18
Q

Attribute-based access control (ABAC)

A

Access control based on characteristics/attributes. Examples: I’m allowing access to this file if you’re a cashier. I’m allowing you to DELETE something. (Actions can be attributes). ABAC is complicated.

19
Q

Privileged access management (PAM)

A

Just think “least privilege”. PAM limits access to only those with the privilege to see/do something. Helps avoid elevated privilege incidents.