ch24 questions and definitions Flashcards
The user presents credentials and requests a ticket from the key Distribution Server
Step 1 of Kerberos
The KDS verifies credentials and issues a TGT
Step 2 of Kerberos
The user presents a TGT and request for service to the KDS
Step 3 of Kerberos
The KDS verifies authorization and issues a client-to-server ticket to the desired service
Step 4 of Kerberos
The user presents a request and a client-to-server ticket to the desired service.
Step 5 of Kerberos
If the client-to-server ticket is valid, service is granted to the client.
Step 6 of Kerberos
A flexible EAP method that allows mutual authentication between a supplicant and a server.
EAP-FAST
A open standard that provides enhanced network security by locking down the network, only allowing authenticated users to access company data, resources, and applications.
EAP-TLS
Protocol that extends TLS and provides certificate-based mutual authentication of the client and network through an encrypted channel.
EAP-TTLS
An access control approach in which access is mediated based on attributes associated with subjects and the objects to be accessed.
ABAC (Attribute Based Access Control)
Access Control policy that is enforced over all subjects and objects in a system where the policy specifies that a subject has been granted access to information can do one or more actions.
DAC (Discretionary Access Control)
Access Control that restricts the ability of a subject or initiator to access or perform some sort of operation on an object or target.
MAC (Mandatory Access Control)
A strategy for managing user access on IT systems.
RBAC (Rule Based Access Control)
A policy-neutral access control mechanism that restricts network access based on a person’s role within an organization.
RBAC (Role Based Access Control)
Stores login credentials, including username, passwords, and addresses, for use on a local computer or on other computers in the same network server.
Credential Manager.
Password management system for macOS.
Keychain