Identity and Access Management Flashcards
Proves who I am to the authenticating system
Identification
What rights do I have to the system once I have been authenticated
Authorization
takes place by me proving that i have authorization to that system
Authentication
What are the Authentication factors
Knowledge, possession, inherence
Something you know authentication factor
Knowledge (passwords, etc)
something you have authentication factor
possession (smart card, etc)
something about you authentication factor
inherence (biometrics)
inherited from a different trusted system
Federated trust
using two or more authentication factors
multi factor authentications
The things assigned to you that you can do
Permissions
Assigned at the system level
Rights/Privileges
Give your user or groups the least amount of privilege to their job done
Least privilege
Labels authorization mode
Mandatory Access Control (MAC)
owner of the data defines access
Discretionary Access Control (DAC)
Access to resources is defined by a set of rules (Groups)
Role-based Access Control (RBAC)
A list of permissions attached to an object
Access Control lists
Tool used to configure a security policy setting on the local device, on a domain joined device and on a domain controller
Local Security Policy
Collection of settings that define what a system will look like and how it will behave for a defined group of users
Group Policy Objects
What are the three permissions that can be given on a Linux file system?
Read, Write, Execute
What are the three groups that can be given rights in a linux file system?
Owner, Group, Everyone
What command is used to change the permissions in a Linux File system?
chmod
What command is used to change the owner in a Linux File system?
chown
What command is used to change the password of a user in a Linux File system?
passwd
In a windows system, granted to users and groups on folders and files
NTFS Permissions
Permissions given to a folder is also given to sub folders and files within the folder
Inheritance
How can inheritance be turned off?
using the Deny checkbox
Networking protocol that provides AAA management for users who connect and use a network service
Remote Authentication Dial-In User Service (RADIUS)
What does the RADIUS server contain?
usernames and passwords
In RADIUS, what is the gateway that separates what we are trying to authenticate to and the person trying to authenticate?
RADIUS client
In RADIUS, what is the person or system trying to get authenticated called?
RADIUS supplicant
What four ports can RADIUS use?
1812, 1812, 1645, 1646
What is the downside to using RADIUS?
Doesn’t handle authorization
What is the protocol developed by Cisco and released as an open standard in 1993??
Terminal Access Controller Access-Control System Plus (TACASC+)
What does TACASC+ handle?
authentication, authorization, and accounting (AAA)
what port does TACACS+ use?
49
What is the oldest authentication method that sends username and password in the clear?
Password Authentication Protocol (PAP)
Which authentication method has a key on both server and client, a challenge message, and sends hash along with challenge message over to the client?
Challenge-Handshake Authentication Protocol (CHAP)
Which authentication method is used for two windows systems within a work group logging into each other? Also referred to “double CHAP”.
NT LAN Manager (NTLM)
Which authentication method uses windows domain controllers?
Kerberos
What port does Kerberos use?
Port 88
What is used exclusively for authenticating for web applications?
Security Assertion Markup Language (SAML)
Which authentication method is more of a structured language that allows one computer to go into someone else’s directory and query and udpate it?
Lightweight Directory Access Protocol (LDAP)
What port does LDAP use?
TCP/UDP Port 389
using Kerberos, what is the domain controller called?
Key distribution center
What tool could you use to set up single sign on within a LAN?
Windows Active Directory
What is the protocol that allows Linux users to use Active Directory
SAMBA
What determines the number of times you can unsuccessfully attempt to log in before you are shut out of the system for a specified period?
account lockout threshold
Where are the settings for passwords located?
Local Security Policy
What relates to how long a password is active before it must be changed?
Maximum password age
What determines how long the user will be locked out of the system before he can attempt to log on again?
Account lockout duration