Lesson 8 Implementing Identity and Account Management Controls Flashcards
How does single-sign-on work?
the user authenticates to an identity provider (IdP) and receives a cryptographic token. The user can present that token to compatible applications as proof they are authenticated, and receive authorizations from the application.
What is an Identity Provider?
The service that provisions the user account and processes authentication requests
What is an Exit interview or Off-Boarding process?
The process of ensuring that an employee leaves a company gracefully
Name the processes of the Offboarding process
- Account management - Disable the user account and privileges and ensure that any info assets created by the user are able to be accessed
- Company assets - retrieve mobile devices, keys, smart cards, USB media, and so on
- Personal assets - Wipe employee devices of corporate data and applications
What is a default account?
One that is created by the operating system or application when it is installed
What is another name for default account?
Admin in Windows
Root/Super User in Linux
What are service accounts
A host or network account that is designed to run a background service, rather than to log on interactively
What does the local system account do
Creates the host processes that start Windows before the user logs on
What does the local Service account do
Has the same privileges as the standard user account. It can only access network resources as an anonymous user
Describe the Network Service Account
has the same privileges as the standard user account but can present the computer’s account credentials when accessing network resources
What is a SSH Host key pair
Identifies an SSH server. he server reveals the public part when a client connects to it. The client must use some means of determining the validity of this public key. If accepted, the key pair is used to encrypt the network connection and start a session.
What is a SSH user key pair
a means for a client to login to an SSH server. The server stores a copy of the client’s public key. The client uses the linked private key to generate an authentication request and sends the request (not the private key) to the server. The server can only validate this request if the correct public key is held for that client.
What two things can allow you to find the geolocation of a user
Ip-address and Location Services
What is Geo-fencing?
the practices of creating a virtual boundary based on real-world geography and accepting and rejecting requests based on location
What is a Time of Day policy?
Policies or configuration settings that limit a user’s access to resources. and establishes logon hours for an account