Given a scenario, implement identity and account management controls Flashcards

1
Q

Identity

A
Identity provider (IdP)
Attributes
Certificates
Tokens
SSH keys
Smart cards
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Identity provider (IdP)

A

The identity provider is the service that provisions the user account and processes authentication requests. On a private network, these identity directories and application authorization services can be operated locally. The same site operates both identity provision and application provision. Most networks now make use of third-party cloud services, however. In this scenario, various protocols and frameworks are available to implement federated identity management across web-based services. This means that a user can create a digital identity with a one provider, but other sites can use that identity to authorize use of an application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Attributes

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Certificates

A

The certificate contains the subject’s public key and is signed by the CA’s public key. These public keys allow third parties to verify the certificate and the signature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Tokens

A

It is inconvenient for users to authenticate to each application they need to use. In a single sign-on system, the user authenticates to an identity provider (IdP) and receives a cryptographic token. The user can present that token to compatible applications as proof they are authenticated, and receive authorizations from the application. With a token, there is always a risk that a malicious actor will be able to capture and replay it. The application protocol that makes use of tokens must be designed to resist this type of attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SSH keys

A

Secure Shell (SSH) is a widely used remote access protocol. It is very likely to be used to manage devices and services. SSH uses two types of key pairs:

A host key pair identifies an SSH server. The server reveals the public part when a client connects to it. The client must use some means of determining the validity of this public key. If accepted, the key pair is used to encrypt the network connection and start a session.
A user key pair is a means for a client to login to an SSH server. The server stores a copy of the client’s public key. The client uses the linked private key to generate an authentication request and sends the request (not the private key) to the server. The server can only validate this request if the correct public key is held for that client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Smart cards

A

Alternatively, a user’s certificate and private key can be stored on a smart card or USB key and used to authenticate to different PCs and mobile devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Account types

A

User account
Shared and generic accounts/credentials
Guest accounts
Service accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

User account

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Shared and generic accounts/credentials

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Guest accounts

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Guest accounts

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Service accounts

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Account policies

A
Password complexity
Password history
Password reuse
Network location
Geofencing
Geotagging
Geolocation
Time-based logins
Access policies
Account permissions
Account audits
Impossible travel time/risky login
Lockout
Disablement
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Password complexity

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Password history

A
17
Q

Password reuse

A
18
Q

Network location

A
19
Q

Geofencing

A
20
Q

Geotagging

A
21
Q

Geolocation

A
22
Q

Time-based logins

A
23
Q

Access policies

A
24
Q

Account permissions

A
25
Q

Account audits

A
26
Q

Impossible travel time/risky login

A
27
Q

Lockout

A
28
Q

Disablement

A