Identity & Access Management Flashcards
An unified login experience when accessing one or more systems
Single Sign On (SSO)
Involves the use of simply one of the three available factors solely in order to carry out the authentication process being requested
Single Factor Authentication
A version of the SAML OASIS standard for exchanging authentication & authorization data between security domains
Security Assertion Markup Language 2.0 (SAML)
An access control model that based on a list of predefined rules that determine what accesses should be granted
Rule-Based Access Control
An access control model that bases the access control authorizations on the roles that the user is assigned within an organization
Role-Based Access Control
A non-contact, automatic identification technology that uses radio signals to identify, track, sort and detect a variety of objects including people, vehicles, goods, & assets without the need for direct contact
Radio Frequency Identification (RFID)
Allows authorized security personnel to simultaneously manage & monitor multiple entry points from a single centralized location
Physical Access Control Systems (PACS)
A system that manages passwords consistently across the enterprise
Password Management System
Ensures that a user is who they claim to be. The more factors used to determine a person’s identity, the greater the trust of authenticity
Multi-Factor Authentication
Access Control that requires the system itself to manage access controls in accordance with the organization’s security policies
Mandatory Access Control (MAC)
A 48-bit number that is supposed to be globally unique
MAC Address
Protection mechanisms that limit user’s access to information & restrict their forms of access on the system to only what is appropriate for them
Logical Access Controls
Developing standard for authenticating network users. Offers two key benefits: Functions in a multi-vendor network, & it does not transmit passwords over the network
Kerberos
Process of collecting & verifying information about a person for the purpose of proving that a person who has requested an account, a credential, or other special privilege is indeed who he or she claims to be, & establishing a reliable relationship
Identity Proofing
Cloud-based services that broker identity & access management functions to target systems on customer’s premises and/or in the cloud
Identity as a Service (IDaaS)