Identifying and Access Management Flashcards
IAM
Security process that provides identity, authentication, and authorization mechanisms
id_rsa.pub
Contains the user’s public key
id_rsa
Contains the user’s private key
The ssh files are found in the ______
~/.ssh/ Directory
authorized_keys
Lists the public keys that server accepts
known_hosts
Contains the lists the public keys that the client accepts config
/etc/ssh/sshd_config
Used to configure an SSH server
Pluggable Authentication Modules (PAM)
Used to help applications make proper use of user accounts in Linux
TCP Wrapper
Checks the allowed and denied hosts before permitting the host to connect with the SSH service
pam_faillock
Recommended as it is newer and improves upon pam_tally2
pam_tally2
Supports user lockout when authentication is done