Security Plus - Chapter 8 Flashcards
Identity
The sets of claims made about a subject.
Subject
People, applications, devices, systems, or organizations that require access to something.
Attributes
A broad range of information about a subject:
Name
Age
Location
Job Title
Ways to claim a user’s identity
Username - associated with an identity
Certificate - stored on systems or paired with a storage device to identify systems, devices, or individuals
Token - A physical device that may generate a code, plug in a USB, or connect via Bluetooth to present a certificate.
SSH key - Cryptographic representations of identity that replaces a username and password
Smartcard - An embedded chip either used with a chip reader device or contactless is a cryptographic card with the ability to generate key pairs on the card itself.
Authentication
Verifies that a user is who they claim that they are.
Authorization
Verifies that a user is provided the proper access that is applied to their account. When combined with authentication protocols, this allows a user to access resources, systems, and other objects based on what the user is permitted to access.
Extensible Authentication Protocol (EAP)
An authentication framework that is commonly used for wireless networks. Types of EAP implementations:
EAP-TLS
LEAP
EAP-TTLS
Challenge Handshake Authentication Protocol (CHAP)
An authentication protocol that uses an encrypted challenge and three-way handshake to send credentials. It is designed to provide more security than earlier protocols like PAP.
802.1X
An IEEE standard for network access control (NAC) used for authentication of devices that want to connect to a network. Supplicants send authentication requests to authenticators such as network switches, access points, or wireless controllers, which connect to the authentication server for validation. These authentication servers are typically RADIUS servers which rely on a backend directory, typically LDAP or Active Directory as a source for identity information.
Remote Authentication Dial-In User Service (RADIUS)
Operates via TCP or UDP in a client-server model. It sends passwords that are obfuscated by a shared secret and MD5 hash, which is not rather secure. It is usually encrypted using IPSec tunnels for the internal traffic. IT is one of the most common authentication, authorization, and accounting systems for network devices, wireless networks, and other services.
Terminal Access Controller Access Control System Plus (TACACS+)
A Cisco designed extension that uses TCP traffic to provide authentication, authorization, and accounting services. It provides full-packet encryption as well as granular command controls, allowing individual commands to be secured as needed.
Kerberos
A protocol for authenticating service requests between trusted hosts across an untrusted network like the Internet. It uses authentication to shield the authentication traffic. Kerberos users are composed of three main elements:
Primary - The username
Instance - Differentiates similar primaries
Realms - Consists of groups of users. Realms are separated by Trust boundaries and have distinct Kerberos key distribution centers (KDC’s)
Kerberos Process
A client using Kerberos to access a service, the client requests an authentication ticket, ticket-granting ticket (TGT). An authentication server checks the client’s credentials and responds with the TGT, which is encrypted using the secret key of the ticket-granting service (TGS). When the client wants to use a service, the client sends the TGT to the TGS (which is usually also the KDC) and includes the name of the resource it wants to use. The TGS sends back a valid session key for the service, and the client presents the key to the service to access it.
Single Sign-On
Allowing users to log in to multiple systems by using a single identity without reauthenticating.
Lightweight Directory Access Protocol (LDAP)
An organizational directory of information about the organization. Commonly deployed as part of an identity and access management infrastructure.
Security Assertion Markup Language (SAML)
An XML based open standard for Internet-based systems to exchange authentication and authorization information. Usually used between identity providers and service providers.
Used for Federated authentication purposes.