click below
click below
Normal Size Small Size show me how
Security + CompTIA
Domain 4 Identity and Access Management
Term | Definition |
---|---|
Authentication Factors | Something you are, something you have, something you know, somewhere you are, something you do |
Physical Access Controls | biometrics, fingerprints, iris scans |
Identification | presenting credentials or keys |
TOTP | algorithm that relies on shared secret and moving factor or counter (Time-based One Time Password) |
HOTP | algorithm specifies an event-based OTP algorithm, where the moving factor is an event counter. The present work bases the moving factor on a time value. A time-based variant of the OTP algorithm provides short-lived OTP values |
Username & Password | most common form of authentication |
Password Lockout | prevents brute-force attacks |
Federation System | accounts in one area can be granted access rights to any other resource, whether local or remote within the domains |
Radius | provides authentication and authorization functions in addition to network access accounting functions - does not provide access control |
KERBEROS | supports mutual authentication, protecting against man-in-the-middle attacks |
PAP | Password Authentication Protocol - weak authentication - strongly discouraged |
OAUTH | provides authorization services, does not provide authentication such as Open ID and SAML |
SAML - Security Assertion Markup Language | an open standard for exchanging authentication and authorization data between parties, in particular, between an identity provider and a service provider. |
IdP | source of username and password authenticates. SP provides service to user |
Access Controls | these include MAC, DAC, ABAC, RBAC |
CAC & PIV Cards | provide smar card functions for identity and authentication |
Disabled, not deleted | employees that leave should have their accounts _______________ |
True | T/F Generic accounts used by multiple users should be prohibited - IE "Managers" |
Role Based or Role/Group Based | logical controls managing users |
TLS Technology using port 636 | LDAP traffic can be made confidential and secure through: |