CIAM-Key Terms and Concepts Flashcards
Term used to generalize and reference multiple entities which access a system such as employees, guest, application users, and external users such as customers, contractors and vendors.
A) Access Administrator
B) Identity Management
C) User
D) Federation
C
A resource or system that provides a generic service to the user in a federated system. To users, a service provider is the same thing as the application they are trying to use.
A) Federation
B) Identity Provider (IdP)
C) Identity Store
D) Service Provider (SP)
D
A person who assigns roles, group memberships, and/or other attributes to a user.
A) User
B) Access Administrator
C) Provisioning
D) Access Management
B
Underlying information associated with users and stored across a variety of technologies, including databases, LDAP, Active Directory, text files, etc.
A) Identity Store
B) Identity Provider (IdP)
C) Identity Management (IdM)
D) Service Provider (SP)
A
A system that validates the identity of a user in a federated system. The Service Provider (or SP) users the IdP to get the identity of the current user.
A) Service Provider (SP)
B) Identity Provider (IdP)
C) Identity Management (IdM)
D) Directory Service
B
The processes and solution that provide for the creation and management of user information also known as IdM.
A) Identity Management
B) Identity Provider
C) User
D) Governance
A
Processes, tools and people which allow organizations to manage use identities and their access while meeting compliance and manage risks.
A) Enforcement
B) Governance
C) Identity Management
D) Entitlements
B
This is a technical implementation that enables identity information to be developed and shared among several entities and across trusted domains.
A) Identity Management
B) Service Provider
C) Access Management
D) Federation
D
The processes associated with a user’s login across a realm of applications or information repositories. It is important to note that IAM services will authorize user access to protected resources, but will delegate the authorization decisions to the applications themselves.
A) Credential
B) Access Management
C) Single Sign-On
D) Authentication
B
The process of validation that people or entities are who they say they are. It is commonly referred to as “logging in.”
A) Authentication
B) Authorization
C) Credentials
D) Single Sign-On
A
The process of determining if a user has the right to access a service or perform an action.
A) Authentication
B) Authorization
C) Single Sign-On
D) Credentials
B
A central authentication protocol that allows users to log-on once and access all systems and data for which they are authorized.
A) Authorization
B) Single Sign-On
C) Authentication
D) Credentials
B
Item such as username/password combination - used by a person or entity to prove him/her/itself to a system.
A) Credentials
B) Single Sign-On
C) Authentication
D) Authorization
A
The software system that stores, organizes and provides access to information in a directory for entities such as people, groups, devices, resources, etc.
A) Governance
B) Identity Provider (IdP)
C) Directory Service
D) Service Provider (SP)
C
Refers to authentication, authorization and logging of identities as they are used within the organization’s IT systems. Carrying-out of access rights primarily occurs through automated processes or mechanisms.
Enforcement