Domain 5 part 2 Flashcards
Occurs as individuals users gain more access to more systems. Can happen intentionally (SSO) and unintentionally (because users often gain new entitlements (access rights)as they take on roles or duties.
Access aggregation
Users gain more entitlements without shedding the old ones
Authorization creeping
Need to share common information Also refers to the policies, processes, and tech that establish user identities and enforce rules about access to digital resources.
Federated Identity Management
Contains a sample of the biometric factor used for comparison during authentication.
reference template
Process that issues service tickets
TGS
Parties that are authencticating
principal
Equivalant of MS domain
Realm
Process the initial request
Authentication server
Equivalent of a domain controller
KDC
MAC defines subjects as —- and objects as ——
active and passive entities upon which subjects act
Access protocol that may be used for authentication wherein X500 tree is present
LDAP
Proposed successor to a very popular prot that uses TCP 3868 and encrypts authorization info. Provides better password protection by allowing a 2-factor strong authentication. Uses port 49 TCP bi-directional
TACACS+
cisco-based prot runs over TCP 49 bi-directional. Requires users to send an ID and static password for authentication. Using reusable password is vulnerability
TACACS
Ticket based authentication proto
kerberos
Generic term for centrally controlled authentication to multiple disparate systems
SSO