Identity and access management Flashcards
What provides a near real-time account creation and provisioning process?
JIT
What error type presents an organization with higher risk impacts?
Type 2 - granting access when it should be denied
Is the physiological characteristic being
measured – such as a retina scan – correctly referred to as a security
token
No
the point of equilibrium between false acceptance and false rejection in any authentication or authorization process
The cross-over error rate
Where there are more false acceptances than rejections’ is known as a
FAR False acceptance rate or type 2 error
where there are more false rejections than acceptances’ is a
False Rejection Rate (FRR) or Type I error and measures the rate at which the system fails to recognize a legitimate identity and denies access, again, as a fraction of the total number of attempts.
What are the three A’s of access management
Authentication
Authorisation
Accounting
There are two primary access control systems,
logical and physical
This form of access control allows for
the greatest flexibility in controls along
with the greatest vulnerabilities.
DAC Discretionary Access Control
This facilitates the setting of stricter
permissions for access, based on risk. For
this reason, it is often called risk-intelligent
access control.
Attribute based access control
When considering modern implementations of access control, which model maps users to applications and then roles?
Limited RBAC - In a limited RBAC (Role-Based Access Control) model, the user is first assigned access permission to an application and to a given role within that application; so, a user might have access to a financial application but only as a user, not a developer.
Authorization can have two meanings
- The initial decision to grant certain permissions to an identity, with respect to actions they can take in the future regarding particular objects.
- The real-time confirmation that a request to perform an action, by a subject, toward a given object is allowed by the privileges that have been defined for that subject, object, and other criteria that may apply.
Is kerberos an example of an identity store
yes
Is x.500 an identity store
yes
This is a lightweight version of x.500
LDAP
the Achilles’ heel of Kerberos
encryption processes are ultimately based on passwords. Therefore, it can fall victim to traditional password- guessing attacks.
Where is a potential single point of failure for kerberos
KDC - it is therefore not unusual to see many of them on a network
What are the three roles within Security Assertion Markup Language (SAML)?
Identity provider, relying party, user