click below
click below
Normal Size Small Size show me how
Security + CompTIA
Domain 4 Identity and Access Management
| Term | Definition |
|---|---|
| Authentication Factors | Something you are, something you have, something you know, somewhere you are, something you do |
| Physical Access Controls | biometrics, fingerprints, iris scans |
| Identification | presenting credentials or keys |
| TOTP | algorithm that relies on shared secret and moving factor or counter (Time-based One Time Password) |
| HOTP | algorithm specifies an event-based OTP algorithm, where the moving factor is an event counter. The present work bases the moving factor on a time value. A time-based variant of the OTP algorithm provides short-lived OTP values |
| Username & Password | most common form of authentication |
| Password Lockout | prevents brute-force attacks |
| Federation System | accounts in one area can be granted access rights to any other resource, whether local or remote within the domains |
| Radius | provides authentication and authorization functions in addition to network access accounting functions - does not provide access control |
| KERBEROS | supports mutual authentication, protecting against man-in-the-middle attacks |
| PAP | Password Authentication Protocol - weak authentication - strongly discouraged |
| OAUTH | provides authorization services, does not provide authentication such as Open ID and SAML |
| SAML - Security Assertion Markup Language | an open standard for exchanging authentication and authorization data between parties, in particular, between an identity provider and a service provider. |
| IdP | source of username and password authenticates. SP provides service to user |
| Access Controls | these include MAC, DAC, ABAC, RBAC |
| CAC & PIV Cards | provide smar card functions for identity and authentication |
| Disabled, not deleted | employees that leave should have their accounts _______________ |
| True | T/F Generic accounts used by multiple users should be prohibited - IE "Managers" |
| Role Based or Role/Group Based | logical controls managing users |
| TLS Technology using port 636 | LDAP traffic can be made confidential and secure through: |