Understanding Identity and Access Management Concepts Flashcards

1
Q

Identity

A

Each person needs some form of identification so that they can prove who they are; this could be anything, ranging from a username to a smart card. It needs to be unique so that the person using that identity is accountable for its user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Authentication

A

The second part after proving your identity is to provide authentication for that identity. This can be done in many ways; for example, inserting a password or if you have a smart card, it would be a Person Identification Number (PIN).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authorization

A

Once the individual has been authenticated, they are given an access level based on their job role. This could also be known as their permission level to the system to which they have access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Accounting

A

Computer systems maintain a log of when users log in and log out, and accounting is the process of maintaining those log files. Example; Windows Desktop in Event Viewer or database on a AAA server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly