CIAM-Key Terms and Concepts Flashcards

1
Q

Term used to generalize and reference multiple entities which access a system such as employees, guest, application users, and external users such as customers, contractors and vendors.

A) Access Administrator

B) Identity Management

C) User

D) Federation

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A resource or system that provides a generic service to the user in a federated system. To users, a service provider is the same thing as the application they are trying to use.

A) Federation

B) Identity Provider (IdP)

C) Identity Store

D) Service Provider (SP)

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A person who assigns roles, group memberships, and/or other attributes to a user.

A) User

B) Access Administrator

C) Provisioning

D) Access Management

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Underlying information associated with users and stored across a variety of technologies, including databases, LDAP, Active Directory, text files, etc.

A) Identity Store

B) Identity Provider (IdP)

C) Identity Management (IdM)

D) Service Provider (SP)

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A system that validates the identity of a user in a federated system. The Service Provider (or SP) users the IdP to get the identity of the current user.

A) Service Provider (SP)

B) Identity Provider (IdP)

C) Identity Management (IdM)

D) Directory Service

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The processes and solution that provide for the creation and management of user information also known as IdM.

A) Identity Management

B) Identity Provider

C) User

D) Governance

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Processes, tools and people which allow organizations to manage use identities and their access while meeting compliance and manage risks.

A) Enforcement

B) Governance

C) Identity Management

D) Entitlements

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This is a technical implementation that enables identity information to be developed and shared among several entities and across trusted domains.

A) Identity Management

B) Service Provider

C) Access Management

D) Federation

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The processes associated with a user’s login across a realm of applications or information repositories. It is important to note that IAM services will authorize user access to protected resources, but will delegate the authorization decisions to the applications themselves.

A) Credential

B) Access Management

C) Single Sign-On

D) Authentication

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The process of validation that people or entities are who they say they are. It is commonly referred to as “logging in.”

A) Authentication

B) Authorization

C) Credentials

D) Single Sign-On

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The process of determining if a user has the right to access a service or perform an action.

A) Authentication

B) Authorization

C) Single Sign-On

D) Credentials

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A central authentication protocol that allows users to log-on once and access all systems and data for which they are authorized.

A) Authorization

B) Single Sign-On

C) Authentication

D) Credentials

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Item such as username/password combination - used by a person or entity to prove him/her/itself to a system.

A) Credentials

B) Single Sign-On

C) Authentication

D) Authorization

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The software system that stores, organizes and provides access to information in a directory for entities such as people, groups, devices, resources, etc.

A) Governance

B) Identity Provider (IdP)

C) Directory Service

D) Service Provider (SP)

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Refers to authentication, authorization and logging of identities as they are used within the organization’s IT systems. Carrying-out of access rights primarily occurs through automated processes or mechanisms.

A

Enforcement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Refers to an identity’s creation, change, termination, validation, approval, propagation and communication.

A

Provisioning

17
Q

Refers to ongoing companywide activities. It includes the establishment of an IAM strategy; administration of IAM policy statement changes; establishment of identity and password parameters; management of manual or automated IAM systems and processes; and periodic monitoring, auditing, reconciliation, and reporting of IAM systems.

A

Identity Management

18
Q

Is the collection of access rights to perform transactional functions. Note: The term _________ is used occasionally and synonymously with access rights.

A

entitlements

19
Q

Is the information representing the rights that the identity is granted.

_____ rights can be granted to allow users to perform transactional functions at various levels. Some examples of transactional functions are copy, transfer, add, change, delete, review and approve.

A

Access

20
Q

Is compromised of unique elements that describe a person or machine. An identity is recognized by a system in many ways included with something the user knows, such as a password or personal identification number (PIN); something the user has, such as an ID card, key fob, or a badge; and something the user is, such as a fingerprint or retinal pattern; or any combination of these elements.

A

Identity