Ch 2. Identity and Access Management Flashcards
Accounting
track user activity and record the activity in logs
What are the five authentication factors?
Something you… are, know, have, do; Somewhere you are
CAC/PIV
Common Access Card / Personal Identity Verification
HOTP
Hash Based One-Time Password; the algorithm combines a secret key and an incrementing counter, and then creates a hash; the result is then converted into a 6-8 digit value
TOTP
like HTOP but a timestamp is used instead of a counter
Multifactor-Authentication
uses two or more factors of authentication
Kerberos
network authentication mechanism used within Windows Active Directory domains and some Unix realms; prevent man-in-the-middle attacks and uses tickets to prevent relay attacks
Kerberos Requirements
method of issuing tickets used for authentication; time synchronization; database of subjects or users
NTLM
New Technology LAN Manager; a suite of protocols that use a Message Digest hashing algorithm to challenge users and check their credentials
LDAP
Lightweight Directory Access Protocol; specifies formats and methods to query directories
SSO
Single Sign On; refers to the ability of a user to log on or access multiple systems by providing credentials only once
Transitive Trust
creates an indirect relationship
SAML
Security Assertion Markup Language; an XML based standard used to exchange authentication and authorization information between different parties; provides SSO for web apps
Federation
uses a federated database to provide central authentication in a non-homogeneous environment; links credentials to multiple OS or networks
Shibboleth
a free, open-source federated identity solution provider