Define identity concepts Flashcards

1
Q

How has digital collaboration changed the landscape of enterprise security?

A

With remote work, BYOD, and SaaS applications, the traditional on-premises network perimeter has expanded, necessitating a shift in security models.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why is identity considered the new security perimeter?

A

As traditional network boundaries dissolve with remote work and cloud services, securing access based on identity rather than location has become crucial.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Identity in the context of cybersecurity.

A

Identity refers to the characteristics or information used to authenticate and authorize someone or something within an organization’s systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the four pillars of identity infrastructure?

A

Administration - Managing the creation, modification, and deletion of identities.
Authentication - Verifying that users are indeed who they claim to be.
Authorization - Determining what resources an authenticated identity can access.
Auditing - Monitoring and logging activities for compliance and security analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain the role of Administration in identity infrastructure.

A

Administration involves the lifecycle management of identities, including how they’re created, updated, or removed, and under what policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the purpose of Authentication in identity security?

A

Authentication ensures that only legitimate users have access to systems by verifying their credentials, often through methods like passwords or multi-factor authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe Authorization in the context of identity security.

A

Authorization controls what an authenticated user can do within the system, specifying rights and permissions based on their identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why is Auditing important in identity management?

A

Auditing tracks activities to ensure compliance, detect security anomalies, and provide accountability for actions taken within the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do SaaS applications affect the security perimeter?

A

SaaS applications extend the security perimeter outside the corporate network, as these services are often hosted in the cloud and accessed from various locations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What security implications does the use of IoT devices bring?

A

IoT devices introduce new vulnerabilities due to their connectivity, requiring identity-based security to manage access and control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Authentication?

A

Authentication is the process of verifying that someone or something is who or what it claims to be. For example, using a password or ID to prove identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Give an example of Authentication in everyday life.

A

When you buy something with a credit card, showing a driver’s license to prove you are the cardholder is an authentication process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does AuthN stand for?

A

AuthN stands for Authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does Authentication work in computer systems?

A

Typically, a user enters a username (to identify who they are) and a password (which should be known only to that user) to gain access to the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Authorization?

A

Authorization involves determining what resources a user can access or what actions they can perform after they have been authenticated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Provide an example of Authorization using a hotel scenario.

A

After checking in (authentication), a hotel guest receives a keycard (authorization) which only allows access to certain areas like their room.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does AuthZ stand for?

A

AuthZ stands for Authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How does Authorization relate to Authentication?

A

Authorization comes after authentication. Once an identity is verified (authenticated), the system then decides what that identity is allowed to do or access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Why are both Authentication and Authorization necessary?

A

Authentication confirms the identity, while Authorization ensures that the identified user has permission to perform certain actions or access specific resources, providing a layered security approach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Can one have Authorization without Authentication?

A

No, generally, Authorization depends on Authentication; first, you verify identity, then you grant access based on permissions associated with that identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is Modern Authentication?

A

Modern Authentication refers to contemporary methods of verifying identity and granting access between a client device and a server, often involving a central identity provider.

22
Q

Define an Identity Provider.

A

An Identity Provider (IdP) is a service that creates, maintains, and manages identity information, and provides authentication, authorization, and auditing services.

23
Q

What role does an Identity Provider play in Modern Authentication?

A

It centralizes the management of authentication services, storing and managing user identity information used to authenticate with servers.

24
Q

How does Modern Authentication benefit organizations?

A

It allows organizations to set authentication policies, monitor user activities, detect suspicious behavior, and enhance security against malicious attacks.

25
Q

Describe the process of authentication in Modern Authentication.

A

The client sends an identity to the IdP for verification. Upon successful authentication, the IdP issues a security token to the client, which is then used to gain access to resources on the server.

26
Q

What is a security token in the context of Modern Authentication?

A

A security token is a digital credential issued by the identity provider which contains necessary information for the server to validate and authorize access.

27
Q

Give examples of cloud-based identity providers.

A

Examples include Microsoft Entra ID, Google, Amazon, LinkedIn, and GitHub.

28
Q

What is Single Sign-On (SSO)?

A

SSO is a capability provided by an identity provider where a user logs in once and can then access multiple applications or resources without needing to re-enter credentials.

29
Q

Explain Federation in the context of SSO.

A

Federation is the setup of SSO between multiple identity providers, allowing users to use one set of credentials across different systems or applications managed by different identity providers.

30
Q

How does the server validate a user in Modern Authentication?

A

The server validates the user by checking the security token received from the client against the trust relationship it has with the identity provider.

31
Q

What is a directory in the context of computer networks?

A

A directory is a hierarchical structure that holds information about objects on a network, such as users, devices, and services.

32
Q

Define a Directory Service.

A

A Directory Service is a software system that stores, organizes, and provides access to directory information for network users, administrators, services, and applications.

33
Q

What is Active Directory (AD)?

A

Active Directory is a set of directory services from Microsoft for on-premises networks, primarily used to manage domain-based resources, users, and security.

34
Q

What is Active Directory Domain Services (AD DS)?

A

AD DS is the core directory service within Active Directory that manages and authenticates users and computers in a Windows domain network.

35
Q

What is a domain controller in AD DS?

A

A domain controller (DC) is a server that runs AD DS, managing the domain’s database and handling authentication requests for users and computers on the network.

36
Q

What are the limitations of AD DS with modern technology?

A

AD DS does not natively support mobile devices, SaaS applications, or applications requiring modern authentication methods.

37
Q

How has the need for modern authentication influenced directory services?

A

The growth of cloud services and SaaS applications has necessitated directory solutions that support modern authentication methods and work across various platforms.

38
Q

What is Microsoft Entra ID?

A

Microsoft Entra ID, formerly known as Azure Active Directory, is a cloud-based identity and access management solution that supports modern authentication for cloud, on-premises, and mobile scenarios.

39
Q

Explain Identity as a Service (IDaaS).

A

IDaaS is a cloud service that provides identity management, allowing organizations to manage user identities and access rights for applications and services in the cloud.

40
Q

How does Microsoft Entra ID differ from traditional Active Directory?

A

Microsoft Entra ID extends beyond the on-premises capabilities of AD by providing identity services for cloud applications, supporting modern authentication protocols, and enabling integration with other cloud services.

41
Q

What is Federation in identity management?

A

Federation is the process that enables users to access services across different organizational or domain boundaries by establishing trust relationships between identity providers.

42
Q

What’s the primary benefit of Federation for users?

A

Users do not need to maintain multiple usernames and passwords for different services; they can use their existing credentials from one identity provider to access resources in another domain.

43
Q

How does Federation work at a basic level?

A
  • A website in one domain uses its identity provider (IdP-A).
  • A user from another domain authenticates via their own identity provider (IdP-B).
  • IdP-A has a configured trust relationship with IdP-B, allowing access without re-authentication.
44
Q

What does a “trust relationship” mean in Federation?

A

A trust relationship in Federation means that one identity provider trusts another to authenticate users. This trust allows users from one domain to access resources in another domain without additional authentication.

45
Q

Is the trust in Federation always mutual?

A

No, trust in Federation is not always bidirectional. One identity provider might trust another, but the reverse might not be true unless specifically configured.

46
Q

Provide an example of Federation in everyday use.

A

Logging into a third-party site using your social media account, like signing into a service with your X (formerly Twitter) account, is an example of Federation where X acts as an identity provider.

47
Q

What happens when a user tries to access a federated service?

A

The user provides credentials to their own IdP. The service’s IdP accepts these credentials based on the pre-established trust, and the user is granted access without needing another set of credentials.

48
Q

What allows a user from Domain B to access a website in Domain A through Federation?

A

The trust relationship configured between Identity Provider A (serving Domain A) and Identity Provider B (serving Domain B) allows this access.

49
Q

How does Federation benefit organizations?

A

It reduces the overhead of managing multiple user accounts, improves user experience, and enhances security by leveraging existing authentication systems.

50
Q

Can you give an example of an identity provider in a Federation scenario?

A

Microsoft Entra ID (formerly Azure AD) can serve as an identity provider in a Federation scenario, potentially federated with services like X or other IdPs.