Domain 5: Access Control Technologies Flashcards
Concentrates access control in one logical point for a system or organization
Centralized Access Control
- Access control where local sites support and maintain independent systems, access control databases and data
- Each sites may have different models, policies and level of security
Decentralized Access Control
Allows users to authenticate once and have access to multiple different systems
Single sign-on (SSO)
Occurs when individual users gain more access to more systems
Access Aggregation
Participating organizations share identity attributes allowing for a user to authenticate with one member then having access to all other members
Federated system
- XML-based language used to send authentication and authorization data between identity providers and service providers
- Frequently used to enable single sign-on for web applications and services
SAML
- Relies on access tokens which are issued by an authorization server and then presented to resource servers like third-party web applications
- Used by Google, Microsoft, Facebook and other sites to allow users to share elements of their identity or account information while authenticating via the original identity provider
OAuth
- An open-source standard for decentralized authentication
- Users create credentials with an identity provider like Google then sites (relying parties) use that identity
OpenID
Combines the OpenID authentication and OAuth authorization into a single protocol
OpenID Connect
- OAuth Component
- The user authenticating
Resource Owner
- OAuth Component
- Applications that users want to use
Client
- OAuth Component
- Servers owned by the identity provider
- Authenticates the resource owner
Authorization Server
- OAuth Component
- The server the client wants to access in behalf of the resource owner
Resource Server
Allows an organization to leverage a cloud service for identity management
Identity as a service (IDaaS)
- Protocol used for interfacing and querying directory service information
- Uses TCP/UDP port 389
- Queries transmitted in cleartext
Lightweight directory access protocol (LDAP)
- Third party authentication service
- Uses AES symmetric encryption and mutual authentication of both clients and servers
- Protects against network sniffing and replay attacks
- Most common single sign-on method used in organizations
Kerberos
- Kerberos term
- A unique identity
- i.e. user and/or service
Principal
- Kerberos term
- The group of systems (domain) Kerberos has authority over
Realm
- Kerberos term
- Encrypted message that provides proof that a subject is authorized to access an object
- Contains client identity, service ID and etc.
Ticket