Chapter 11 Identity and Access Management Security Flashcards
Associated with an identity include information about a subject and often include their name, address, title, contact information, and other details about the individual
Attributes
Create, store, and manage identity information as well as the permissions, groups, and other information needed to support the use of identities
IAM systems
- Provide information about systems, users, and other information about the organization
- i.e. LDAP
Directory services
What steps are required to implement a secure LDAP server?
- Enabling and requiring TLS keeps LDAP queries and authentication secure
- Setting password storage to use a secure method. LDAP passwords are often stored in plain text, additional methods are supported and should be used if possible
- Use password-based authentication in requiring TLS
Replication of LDAP servers can help prevent denial-of-service attacks another service outages - Access Control list for LDAP offer the ability to limit access to specific objects in the directory as well as for how entries are created, modified, and deleted
Uses TCP traffic to provide AAA services
TACACS+
- Can operate via TCP or UDP and operates in a client-server model
- Sends passwords that are obfuscated by a shared secret or md5 hash password security is not very strong
RADIUS
Designed to operate on untrusted networks and uses encryption to protect its authentication traffic
Kerberos
Users in Kerberos are known as what?
Principles
Users in Kerberos called principles are composed of what three elements?
The primary - Frequently the username
The instance - Used to differentiate similar primaries
The realm - Consist of groups and principles
- Systems to allow users to authenticate once and then to use multiple systems are services without having to use different usernames or passwords
- i.e. LDAP and the central authentication Service (CAS)
Single Sign-On
Allow and identity to be reused on multiple sites while relying on authentication via single identity provider
Shared Authentication
Shared Authentication Technologies include what?
OpenID
OAuth
OpenID Connect
Facebook Connect
- An open-source standard for decentralized authentication
- Users create credentials with an identity provider like Google then sites (relying parties) use that identity
OpenID
- Relies on access tokens which are issued by an authorization server and then presented to resource servers like third-party web applications
- Used by Google, Microsoft, Facebook and other sites to allow users to share elements of their identity or account information while authenticating via the original identity provider
OAuth
Authentication layer built using the OAuth protocol
OpenID Connect
Shared authentication system that relies on Facebook credentials for authentication
Facebook Connect
Includes training and awareness, as well as threats like Insider attacks, phishing and social engineering
Personal based identity security
Their roles in attacks on identity, including capturing credentials via local exploits; screen capture and keyboard capture applications
Endpoint Threats
Can target systems that run identity services, or which can attack the servers and send identity and authentication data to AAA services
Server-based exploits