Ch. 4 - Vocab Flashcards
access control
implements a security policy that specifies who may have access to each specific system resource, and the type of access that is permitted in each instance
access control list
decomposition of the access matrix in column, providing the list of access rights of each user to an object
access management
controls the ways entities are granted access to resources: consists of resource management, privilege management, and policy management
access matrix
a matrix consisting of subjects attempting to access resources and objects that may be accessed
attribute
are characteristics that define specific aspects of the subject, object, or environment conditions. It consists of a name and a value
attribute-based access control
controls access based on attributes of the user, the resource to be accessed, and current environmental conditions
attribute exchange network
an online Internet-scale gateway for identity service providers and relying parties to efficiently access online identity attributes
attribute provider
in the OITF, it verifies given attributes presented by subjects and creates conformant attribute credentials according tot the AXN
auditor
in OITF, these are entities that check that parties’ practices have been in line with what was agreed from the OITF
authorizations
otherwise known as privileges
assessor
in OITF, these evaluate identity service providers and RPs, and certify if they are able to follow OITF provider’s blueprint
capability ticket
specifies authorized objects and operations for a particular user
cardinality
a maximum number with respect to roles
closed access control policy
authorizations specify permissions for an access
credential
data structure that authoritatively binds an identity to a token possessed by a subscriber
credential management
authoritatively binds an identity to a token possessed by a subscriber
discretionary access control
controls access based on the identity of the requestor and on access rules stating what requestors are allowed to do
dispute resolver
provides arbitration and dispute resolution under OIX guidelines
dynamic separation of duty
a user can take multiple role, but cannot take them simultaneously
entitlements
otherwise known as privileges
environment attribute
describes the operational, technical, and situational environment in which information access occurs, may include data and time, network security level
general role hierarchy
there is support for an arbitrary partial order to serve as the role hierarchy
group
a set of users with may be given privileges to an object
identity, credential, and access management
A comprehensive approach to managing and implementing identities, credentials, and access control. Consists of the categories Credential Management, Identity Management, Identity Federation, and Access Management