Cloud IAM Flashcards
Someone or something that has an identity
An Entity
A unique expression of an entity within a given environment. When you log into a work system, your username would be your identity.
An Identity
A cryptographic token in a digital environment that identifies an identity (such as a user) to an application or service. Windows systems, for example, use a security identifier (SID) to identify users. In real life, an identifier could be a passport.
An Identifier
A facet (aspect) of an identity; anything about the identity and the connection itself. An attribute could be static (group membership, organizational unit) or highly dynamic (IP address used for your connection, your physical location). For example, if you log on with multifactor authentication, an attribute could be used to determine the permissions granted to your access (attribute-based access control).
An Attribute
Your Identity and attributes in a specific situation
A Persona
- A temporary credential that is inherited by a system within a cloud environment. 2. A part of federation; how your group membership within your company is granted entitlements in your Infrastructure as a Service (IaaS) provider. 3. The job you perform at work.
A Role
The process of confirming your identity.
Authentication
The three factors in authentication: something you know, something you have, and something you are.
Multifactor authentication (MFA)
A control that restricts access to a resource. This is the “access management” portion of IAM.
Access control
Logging and monitoring capabilities.
Accounting (IAM)
The ability to allow an identity to do something. The hotel key you get after authorization allows you to access your room, the gym, laundry, and so on. In an IT analogy, you are authorized to access a file or system.
Authorization (Authz)
The permissions you have to something. The CSA uses the term “entitlements” rather than “permissions,” but the meaning is the same. Entitlements determine what an identity is allowed to do by mapping an identity to an authorization. These can (and should) be documented as an entitlement matrix.
Entitlement
A token or ticket system used to authorize a user rather than having the user sign on to individual systems in a domain. Kerberos is an example of SSO in a Windows environment.
Single-sign-on (SSO)
A key enabler of SSO across different systems that enables the action of authenticating locally and authorizing remotely.
Federated identity management
The “root” source of an identity. A common example of this is a directory server (such as Active Directory). Alternatively, the payroll system could be the true authoritative source.
Authoritative source