Chapter 8 - Identity and Access Management Flashcards
Identity
Identities are the sets of claims made about a subject. Subjects are typically people, applications, devices, systems, or organizations, but the most common application of Identity is to individuals.
What are some of the common ways of claiming an identity?
- Usernames
- Certificates
- Tokens
- SSH keys
- Smartcards
Single Sign-On (SSO)
Single Sign-On systems allow a user to log in with a single identity and then use multiple systems or services without reauthenticating.
Lightweight Directory Access Protocol (LDAP)
The Lightweight Directory Access Protocol is commonly deployed as part of an identity management infrastructure and offers hierarchically organized information about the organization. LDAP is commonly used as part of SSO infrastructures.
What are some of the core technologies that internet-based systems and architectures often rely on for authentication, authorization, and SSO?
- Security Assertion Markup Language (SAML)
- OpenID
- OAuth
Security Assertion Markup Language (SAML)
Security Assertion Markup Language is an XML-based open standard for exchanging authentication and authorization information. SAML is often used between identity providers and service providers for web-based applications.
OpenID
OpenID is an open standard for decentralized authentication. A common example of this is the “Log in with Google” functionality that many websites provide. Relying Parties (RPs) redirect authentication requests to the Identity Providers (IdPs) and then receive a response with an assertion that the user is who they claim to be due to successful authentication.
OAuth
OAuth is an open standard for authorization used by many websites. OAuth provides a method for users to determine what information to provide to third-party applications and sites without sharing credentials.
Identity Provider (IdP)
Identity Providers manage the life cycle of digital identities from creation through maintenance to eventual retirement of the identity in the systems and services it supports.
What is meant by a Federated environment in IT?
In a federated environment, user authentication is separated from user access through the use of one or more external entities that provide independent authentication of user credentials.
Passwordless Authentication
Passwordless Authentication often relies on something you have (security tokens, certificates) or something you are (biometric factors).
Multifactor Authentication (MFA)
Multifactor Authentication ensures that a single compromised factor like a password does not create undue risk. MFA relies on two distinct factors for authentication.
What are the four commonly used authentication factors?
- Something you know (password, PIN)
- Something you have (smartcard, USB, Bluetooth token)
- Something you are (physical/biometric characteristics)
- Somewhere you are (GPS, network location)
One-Time Passwords (OTP)
One-Time Passwords are usable only once. Brute-force attacks against an OTP will be constantly attempting to identify a constantly changing target.
Time-Based One-Time Passwords (TOTP)
Time-Based One-Time Passwords use an algorithm to derive a one-time password using the current time as part of the code-generation process. The code is valid for a set period of time and then moves on to the next time-based code.