Given a scenario, implement identity and account management controls Flashcards
Identity
Identity provider (IdP) Attributes Certificates Tokens SSH keys Smart cards
Identity provider (IdP)
The identity provider is the service that provisions the user account and processes authentication requests. On a private network, these identity directories and application authorization services can be operated locally. The same site operates both identity provision and application provision. Most networks now make use of third-party cloud services, however. In this scenario, various protocols and frameworks are available to implement federated identity management across web-based services. This means that a user can create a digital identity with a one provider, but other sites can use that identity to authorize use of an application.
Attributes
Certificates
The certificate contains the subject’s public key and is signed by the CA’s public key. These public keys allow third parties to verify the certificate and the signature.
Tokens
It is inconvenient for users to authenticate to each application they need to use. In a single sign-on system, the user authenticates to an identity provider (IdP) and receives a cryptographic token. The user can present that token to compatible applications as proof they are authenticated, and receive authorizations from the application. With a token, there is always a risk that a malicious actor will be able to capture and replay it. The application protocol that makes use of tokens must be designed to resist this type of attack.
SSH keys
Secure Shell (SSH) is a widely used remote access protocol. It is very likely to be used to manage devices and services. SSH uses two types of key pairs:
A host key pair identifies an SSH server. The server reveals the public part when a client connects to it. The client must use some means of determining the validity of this public key. If accepted, the key pair is used to encrypt the network connection and start a session.
A user key pair is a means for a client to login to an SSH server. The server stores a copy of the client’s public key. The client uses the linked private key to generate an authentication request and sends the request (not the private key) to the server. The server can only validate this request if the correct public key is held for that client.
Smart cards
Alternatively, a user’s certificate and private key can be stored on a smart card or USB key and used to authenticate to different PCs and mobile devices.
Account types
User account
Shared and generic accounts/credentials
Guest accounts
Service accounts
User account
Shared and generic accounts/credentials
Guest accounts
Guest accounts
Service accounts
Account policies
Password complexity Password history Password reuse Network location Geofencing Geotagging Geolocation Time-based logins Access policies Account permissions Account audits Impossible travel time/risky login Lockout Disablement
Password complexity