Ch 2. Identity and Access Management Flashcards
Accounting
track user activity and record the activity in logs
What are the five authentication factors?
Something you… are, know, have, do; Somewhere you are
CAC/PIV
Common Access Card / Personal Identity Verification
HOTP
Hash Based One-Time Password; the algorithm combines a secret key and an incrementing counter, and then creates a hash; the result is then converted into a 6-8 digit value
TOTP
like HTOP but a timestamp is used instead of a counter
Multifactor-Authentication
uses two or more factors of authentication
Kerberos
network authentication mechanism used within Windows Active Directory domains and some Unix realms; prevent man-in-the-middle attacks and uses tickets to prevent relay attacks
Kerberos Requirements
method of issuing tickets used for authentication; time synchronization; database of subjects or users
NTLM
New Technology LAN Manager; a suite of protocols that use a Message Digest hashing algorithm to challenge users and check their credentials
LDAP
Lightweight Directory Access Protocol; specifies formats and methods to query directories
SSO
Single Sign On; refers to the ability of a user to log on or access multiple systems by providing credentials only once
Transitive Trust
creates an indirect relationship
SAML
Security Assertion Markup Language; an XML based standard used to exchange authentication and authorization information between different parties; provides SSO for web apps
Federation
uses a federated database to provide central authentication in a non-homogeneous environment; links credentials to multiple OS or networks
Shibboleth
a free, open-source federated identity solution provider
OAuth
an open standard for authorization many companies
OpenID Connect
works with OAuth 2.0 to allow clients (web site) to verify the identity of end users without managing theit credentials
Least Privilege
a technical control; specifies that individuals and processes are granted only the rights and permissions needed to perform assigned tasks or functions
What are the four different account types?
End User account; Privileged accounts; Guest accounts; Service accounts
Disablement Policy
specifies how to manage accounts in different situations
Credential
a collection of information that provides an identity and proves that identity
What are the five access control models?
Role-BAC; Rule-BAC; DAC; MAC; ABAC
Role-BAC
a role-BAC models uses roles based on jobs and functions. A matrix is a planing document that matches the roles with the required privileges
Rule-BAC
based on a set of approved instructions, such as an access control list.
DAC
Discretionary Access Control; specifies that every object has an owner, and the owner has full, explicit control of the object. Microsoft NTFS uses the DAC model
MAC
Mandatory Access Control; uses sensitivity labels for users and data. Commonly used when access needs to be restricted based on a need to know.
ABAC
Attribute Based Access Control; uses attributes defined in policies to grant access to resources; commonly used in software defined networks