Given a scenario, implement authentication and authorization solutions Flashcards
Authentication management
Password keys Password vaults TPM HSM Knowledge-based authentication
Password keys
Password key—USB tokens for connecting to PCs and smartphones. Some can use nearfield communications (NFC) or Bluetooth as well as physical connectivity
Password vaults
Password vault—software-based password manager, typically using a cloud service to allow access from any device (pcmag.com/picks/the-best-password-managers). A USB key is also likely to use a vault for backup. Most operating systems and browsers implement native password vaults. Examples include Windows Credential Manager and Apple’s iCloud Keychain (imore.com/icloud-keychain).
TPM
Trusted Platform Module (TPM)—a secure cryptoprocessor enclave implemented on a PC, laptop, smartphone, or network appliance. The TPM is usually a module within the CPU. Modification of TPM data is only permitted by highly trusted processes. A TPM can be used to present a virtual smart card (docs.microsoft.com/en-us/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-overview).
HSM
An appliance for generating and storing cryptographic keys. This sort of solution may be less susceptible to tampering and insider threats than software-based storage.
Knowledge-based authentication
Knowledge-based authentication refers primarily to issuing users with password-based account access mechanisms. Configuring password-based authentication protocols and supporting users with authentication issues is an important part of the information security role. In this topic, you will learn how some common authentication protocols work and about the ways that they can be put at risk by password cracking techniques.
Authentication/authorization
EAP Challenge Handshake Authentication Protocol (CHAP) Password Authentication Protocol (PAP) 802.1X RADIUS Single sign-on (SSO) Security Assertions Markup Language (SAML) Terminal Access Controller Access Control System Plus (TACACS+) OAuth OpenID Kerberos
EAP
Framework for negotiating authentication methods that enables systems to use hardware-based identifiers, such as fingerprint scanners or smart card readers, for authentication.
Challenge Handshake Authentication Protocol (CHAP)
Authentication scheme developed for dial-up networks that uses an encrypted three-way handshake to authenticate the client to the server. The challenge-response is repeated throughout the connection (though transparently to the user) to guard against replay attacks.
Password Authentication Protocol (PAP)
Obsolete authentication mechanism used with PPP. PAP transfers the password in plaintext and so is vulnerable to eavesdropping.
802.1X
A standard for encapsulating EAP communications over a LAN (EAPoL) to implement port-based authentication.
RADIUS
A standard protocol used to manage remote and wireless authentication infrastructures.
Single sign-on (SSO)
An authentication technology that enables a user to authenticate once and receive authorizations for multiple services.
Security Assertions Markup Language (SAML)
An XML-based data format used to exchange authentication information between a client and a service.
Terminal Access Controller Access Control System Plus (TACACS+)
An AAA protocol developed by Cisco that is often used to authenticate to administrator accounts for network appliance management.