Identity and Access Management Flashcards
PAP
Password Authentication Protocol
Used with PPP (Point-to-point protocol).
Sends passwords over a network in cleartext.
Used as last resort
MS-CHAP and MS-CHAPv2
Microsoft Challenge Handshake Authentication Protocol.
Improvement over CHAP. MS-CHAPv2 allows for performing mutual authentication which means the client authenticates to the server AND the server authenticates to the client.
CHAP
Challenge Handshake Authentication Protocol.
Uses PPP and authenticates remote users. Client and server both know a shared secret used in the authentication protocol.
RADIUS Defintion
Remote Authentication Dial-In User Service.
Centralized authentication service. RADIUS can also be used as an 802.1x server with WPA2 Enterprise mode. It is common for a RADIUS server to access a LDAP server that holds accounts as opposed to holding the database itself. Uses UDP, only encrypts password, not entire authentication process
TACACS+ Definition
Terminal Access Controller Access-Control System Plus. Cisco alternative to RADIUS. Encrypts the entire authentication process, where RADIUS only encrypts the password. TACACS+ uses multiple challenges and responses between the client and the server. Can interact with Kerberos.
Diameter
Extension of RADIUS. Uses TCP instead of UDP. Backwards compatible with RADIUS. Capable of secure transmissions with EAP
Role-Based Access Control
Uses roles to manage rights and permissions. Administrator creates roles and assigns them specific roles and permissions and then adds users to that role as necessary. It’s common to document roles and their privileges in a matrix
Group-based access control
A common way to implement role-based access control is with groups. Microsoft uses built-in security groups
Rule-based Access Control
Based on a set of approved instructions, such as an access control list. Some rule-BAC systems use rules that trigger in response to an event
Discretionary Access Control
Every object (Files, folders, etc.) has an owner. Owner establishes access for the objects. Common example is New Technology File System (NTFS) used in Windows
Mandatory Access Control
Uses labels to determine access. Widely used by military units. MAC model uses a lattice to divide access into separate compartments
Attribute-Based Access Control
Uses attributes defined in policies to grant access to resources. Commonly used in Software Defined Networks (SDNs)