Quick Tips 2 Flashcards
BLANK reduces the resolution process for password issues for the help-desk department.
Assisted password reset
BLANK contain all resource information, users’ attributes, authorization profiles, roles, and possibly access control policies so other IdM applications have one centralized resource from which to gather this information.
IdM directories
An BLANK is common in account management products that provide IdM solutions.
automated workflow component
BLANK refers to the creation, maintenance, and deactivation of user objects and attributes, as they exist in one or more systems, directories, or applications.
User provisioning
The BLANK is usually considered the authoritative source for user identities because that is where it is first developed and properly maintained.
HR database
There are three main access control models: BLANK.
discretionary, mandatory, and role-based
BLANK enables data owners to dictate what subjects have access to the files and resources they own.
Discretionary access control (DAC)
The BLANK model uses a security label system. Users have clearances, and resources have security labels that contain data classifications. BLANK systems compare these two attributes to determine access control capabilities.
mandatory access control (MAC), MAC
BLANK is based on the user’s role and responsibilities (tasks) within the company.
Role-based access control
Three main types of restricted interface measurements exist: BLANK.
menus and shells, database views, and physically constrained interfaces
BLANK are bound to objects and indicate what subjects can use them.
Access control lists
A BLANK is bound to a subject and lists what objects it can access.
capability table
Access control can be administered in two main ways: BLANK.
centralized and decentralized
Some examples of centralized administration access control technologies are BLANK.
RADIUS, TACACS+, and Diameter
A BLANK administration example is a peer-to-peer working group.
decentralized