Chapter 08: Identity and Access Management Flashcards
Name of an authentication framework that is commonly used for wireless networks.
EAP (Extensible Authentication Protocol)
______ is an authentication protocol designed to provide more security than protocols like PAP.
CHAP
Name microsoft’s version of CHAP.
MS-CHAP
_______ is a password-centric authentication protocol that was commonly used with the Point-to-Point protocol to authenticate users.
Password Authentication Protocol (PAP)
RADIUS servers often rely upon backend directory using ________ or _______ as a source of identity information.
LDAP or Active Directory
Name the four pieces of equipment in an authentication architecture with EAP, RADIUS, and LDAP.
Supplicant -> Authenticator -> Authentication Server -> Directory Services
Under an authentication architecture with EAP, RADIUS, and LDAP, what protocol goes from Supplicant to Authenticator?
EAP
Under an authentication architecture with EAP, RADIUS, and LDAP, what protocol goes from Authenticator to Authentication Server?
RADIUS
AAA
Authentication, Authorization, and Accounting
Which authentication extension is cisco designed?
a. Kerberos
b. RADIUS
c. TACACS+
d. LEAP
c. TACACS+
Which protocol is designed to operate on untrusted networks and uses authentication to shield its authentication traffic?
Kerberos
in kerberos, the client’s first request for a _______.
Ticket-Granting Ticket (TGT)
______ is an xml based open standard for exchanging authentication and authorization information. It is often used between identity providers and service providers for web-based applications.
SAML (Security Assertion Markup Language)
_____ is an open standard for decentralized authentication. Its identity providers can be leveraged for third-party sites using established identities.
OpenID.
“Log in with Google” functionality is an example of _________.
OpenID
________ is an open standard for authorization used by many websites. It provides a method for users to determine what information to provide to third-party apps without sharing credentials.
OAuth
An example of Google Drive plug-ins requesting access to your files or folders is an example of _______.
OAuth
________ systems allow user to log in with a single identity and then use multiple systems or services without reauthenticating.
SSO
Which two protocols are SSO typically implemented in Windows Domains.
LDAP and Kerberos
Identity information is handled by an ______. They manage the life cycle of digital identities from creation through maintenance to eventual retirement of the identity in the systems and services it supports.
Identity Provider (IdP)
In __________ deployments, the identity providers are paired with relying parties, which trust the identity provider to handle authentication and then rely on that authentication to grant access to services.
federated identity deployments
Who is the principal under a federated environment?
The user
_____ - who provide identity and authentication services via an attestation process in which the IdP validates that the user is who they claim to be.
Identity Providers (IdPs)
_______ - who provide services to users whose identities have been attested to by an identity provider.
SPs