Cloud IAM Flashcards

1
Q

Someone or something that has an identity

A

An Entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A unique expression of an entity within a given environment. When you log into a work system, your username would be your identity.

A

An Identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A cryptographic token in a digital environment that identifies an identity (such as a user) to an application or service. Windows systems, for example, use a security identifier (SID) to identify users. In real life, an identifier could be a passport.

A

An Identifier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A facet (aspect) of an identity; anything about the identity and the connection itself. An attribute could be static (group membership, organizational unit) or highly dynamic (IP address used for your connection, your physical location). For example, if you log on with multifactor authentication, an attribute could be used to determine the permissions granted to your access (attribute-based access control).

A

An Attribute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Your Identity and attributes in a specific situation

A

A Persona

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. A temporary credential that is inherited by a system within a cloud environment. 2. A part of federation; how your group membership within your company is granted entitlements in your Infrastructure as a Service (IaaS) provider. 3. The job you perform at work.
A

A Role

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The process of confirming your identity.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The three factors in authentication: something you know, something you have, and something you are.

A

Multifactor authentication (MFA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A control that restricts access to a resource. This is the “access management” portion of IAM.

A

Access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Logging and monitoring capabilities.

A

Accounting (IAM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The ability to allow an identity to do something. The hotel key you get after authorization allows you to access your room, the gym, laundry, and so on. In an IT analogy, you are authorized to access a file or system.

A

Authorization (Authz)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The permissions you have to something. The CSA uses the term “entitlements” rather than “permissions,” but the meaning is the same. Entitlements determine what an identity is allowed to do by mapping an identity to an authorization. These can (and should) be documented as an entitlement matrix.

A

Entitlement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A token or ticket system used to authorize a user rather than having the user sign on to individual systems in a domain. Kerberos is an example of SSO in a Windows environment.

A

Single-sign-on (SSO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A key enabler of SSO across different systems that enables the action of authenticating locally and authorizing remotely.

A

Federated identity management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The “root” source of an identity. A common example of this is a directory server (such as Active Directory). Alternatively, the payroll system could be the true authoritative source.

A

Authoritative source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The party that manages the identities and creates the identity assertions used in federation.

A

Identity provider

17
Q

The system that consumes identity assertions from the identity provider. This is sometimes referred to as a “service provider.”

A

Relying party

18
Q

standard for federated identity management supports both authentication and authorization. Assertions are based on XML and are used between an identity provider and a relying party. These assertions can contain authentication, attribute, and authorization statements. SAML is widely supported by many cloud providers and many enterprise tools as a result.

A

Security Assertion Markup Language (SAML)

19
Q

This IETF authorization standard is widely used for web and consumer services.
is most often used for delegating access control and authorization (delegated authorization) between services.

A

OAuth

20
Q

his standard for federated authentication is well supported for web services. It runs over HTTP with URLS to identify providers. is commonly seen in consumer services such as logging in to web sites.

A

OpenID

21
Q

his is the standard for defining attribute-based access controls and authorizations.
is a policy language for defining access controls at a policy decision point (PDP) and passing them to a policy enforcement point (PEP).

A

eXtensible Access Control Markup Language (XACML)

22
Q

This standard deals with exchanging identity information between domains.
It is used for provisioning and deprovisioning accounts in external systems and exchanging attribute information.

A

System for Cross-domain Identity Management (SCIM)