Okta Technical Flashcards
Universal Directory?
Customize, organize and manage any set of user attributes from multiple identity sources with this flexible, cloud-based user store.
Single Sign-On
Free your people from the chains of multiple passwords. A single set of credentials gives them access to enterprise apps in the cloud, on-prem and on mobile devices.
Lifecycle Management
Automate user onboarding and offboarding by ensuring seamless communication between directories such as Active Directory and LDAP, and cloud applications such as Workday, SuccessFactors, Office 365 and RingCentral.
Adaptive Multi-Factor Authentication
Secure your apps and VPN with a robust policy framework, a comprehensive set of modern verification factors, and adaptive, risk-based authentication that integrates with all of your apps and infrastructure.
Workforce Identity
Workforce Identity products are geared toward IT and security leaders. At a very high level, they simplify the way people connect to enterprise technology, while increasing efficiency and helping keep IT environments secure.
Identities connect to…
N.A.D.A. Networks Applications Devices APIs
Authentication (Definition)
Authentication is the process of verifying that a user is who he or she says they are, and is typically done before the user is given access to the resource they have requested.
MFA (Definition)
Multi-factor authentication (MFA), for example, looks at a combination of factors in different categories (something you know, something you have, and something you are) to verify identity. So a user may be challenged for a password – a something you know factor – and a software token – a something you have factor – in order to log in.
(Know, Have, Are)
Context (Definition)
Context can mean any of several things about a login including user context (who is trying to access), application context (what is the user trying to access), network and location context (where are they accessing from), and device context (from what device is access being requested).
Who, What (Application/Device), Where (Network/Location)
Risk-based Authentication (Definition)
Risk-based authentication typically takes into account relative risk by calculating a risk score for every login request. The higher the score, the riskier the login, and the higher the chance it’s a malicious login attempt.
What are the two dynamics that an organization has to balance?
Security and usability
What is the weakest point in a company’s security?
Their people
81% of all breaches used either…
stolen or weak passwords
Name 3 common attacks
Credential phishing, password spraying, and brute force attacks
Name 3 context signals
Location, device, network
What is a good use case for Zero Trust?
Infrastructure access should be the first Zero Trust use case implemented. Because it applies to a subset of technical users who are capable of handling the architectural and procedural changes, our customers have found great success when they narrow their focus to this one initiative.
Shift Left (Definition)
Shift-left testing is an approach to software testing and system testing in which testing is performed earlier in the lifecycle. It is the first half of the maxim “Test early and often.” It was coined by Larry Smith in 2001.
LDAP (Definition)
The Lightweight Directory Access Protocol (LDAP /ˈɛldæp/) is an open, vendor-neutral, industry standard application protocol for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network.[1] Directory services play an important role in developing intranet and Internet applications by allowing the sharing of information about users, systems, networks, services, and applications throughout the network.[2] As examples, directory services may provide any organized set of records, often with a hierarchical structure, such as a corporate email directory. Similarly, a telephone directory is a list of subscribers with an address and a phone number.
Which PAM module is used for LDAP authentication?
The pam_ldap module is a Pluggable Authentication Module (PAM) which provides for authentication, authorization and password changing against LDAP servers.
These interfaces are a headache to build and operate, and break down quickly at scale. It can very quickly turn into a distributed systems challenge, with little guarantee of consistency.
Bastion Host (Definition)
A bastion host is a special-purpose computer on a network specifically designed and configured to withstand attacks. The computer generally hosts a single application, for example a proxy server, and all other services are removed or limited to reduce the threat to the computer. It is hardened in this manner primarily due to its location and purpose, which is either on the outside of a firewall or in a demilitarized zone (DMZ) and usually involves access from untrusted networks or computers.
SSH (Definition)
Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network.[1] Typical applications include remote command-line, login, and remote command execution, but any network service can be secured with SSH.
SIEM (Definition)
In the field of computer security, security information and event management (SIEM), software products and services combine security information management (SIM) and security event management (SEM). They provide real-time analysis of security alerts generated by applications and network hardware.
Vendors sell SIEM as software, as appliances, or as managed services; these products are also used to log security data and generate reports for compliance purposes.[1]
The term and the initialism SIEM was coined by Mark Nicolett and Amrit Williams of Gartner in 2005.