Identity and Access Management Flashcards
Proves who I am to the authenticating system
Identification
What rights do I have to the system once I have been authenticated
Authorization
takes place by me proving that i have authorization to that system
Authentication
What are the Authentication factors
Knowledge, possession, inherence
Something you know authentication factor
Knowledge (passwords, etc)
something you have authentication factor
possession (smart card, etc)
something about you authentication factor
inherence (biometrics)
inherited from a different trusted system
Federated trust
using two or more authentication factors
multi factor authentications
The things assigned to you that you can do
Permissions
Assigned at the system level
Rights/Privileges
Give your user or groups the least amount of privilege to their job done
Least privilege
Labels authorization mode
Mandatory Access Control (MAC)
owner of the data defines access
Discretionary Access Control (DAC)
Access to resources is defined by a set of rules (Groups)
Role-based Access Control (RBAC)
A list of permissions attached to an object
Access Control lists
Tool used to configure a security policy setting on the local device, on a domain joined device and on a domain controller
Local Security Policy
Collection of settings that define what a system will look like and how it will behave for a defined group of users
Group Policy Objects
What are the three permissions that can be given on a Linux file system?
Read, Write, Execute
What are the three groups that can be given rights in a linux file system?
Owner, Group, Everyone