Authentication Authorization and Accounting Flashcards
Security+
What does the AAA framework stand for?
Authentication, Authorization, and Accounting
What is identification in the context of the AAA framework?
It’s who you claim to be, often represented by a username, especially for devices you may not physically see.
Why can’t a system type a password?
Because systems are not human and require other forms of authentication to prove identity.
What is authentication?
The process of proving you are who you say you are, often through passwords and other authentication factors.
How can you authenticate a device?
By using passwords, multi-factor authentication, or by placing a digitally signed certificate on the device.
What is the role of a Certificate Authority (CA) in authentication?
A CA issues and digitally signs certificates that validate the identity of devices and users within an organization.
What is authorization in the AAA framework?
It determines what access you have based on your identification and authentication, such as VPN access.
How does management software use certificates?
It validates the end device based on the certificates issued by the organization.
What does accounting refer to in the AAA framework?
Tracking resources used, such as login time, data sent and received, and logout time.
What does a digitally signed certificate signify?
It verifies that the certificate is valid and was issued by a trusted Certificate Authority (CA).
Why might an organization maintain its own CA?
To have control over certificate issuance and ensure the trustworthiness of devices within their network.
What happens when a device has a certificate?
It can use that certificate as an authentication factor to prove its identity to the network.
What is required for a certificate to be valid?
The CA’s digital signature must be present and recognized by the system validating the certificate.
What happens after a user or device has authenticated?
They gain access to resources based on the applied authorization model.
What is the role of an authorization model in user access?
It defines access rights based on roles, organizations, attributes, etc.