Domain 5: Access Control Technologies Flashcards
(49 cards)
Concentrates access control in one logical point for a system or organization
Centralized Access Control
- Access control where local sites support and maintain independent systems, access control databases and data
- Each sites may have different models, policies and level of security
Decentralized Access Control
Allows users to authenticate once and have access to multiple different systems
Single sign-on (SSO)
Occurs when individual users gain more access to more systems
Access Aggregation
Participating organizations share identity attributes allowing for a user to authenticate with one member then having access to all other members
Federated system
- XML-based language used to send authentication and authorization data between identity providers and service providers
- Frequently used to enable single sign-on for web applications and services
SAML
- Relies on access tokens which are issued by an authorization server and then presented to resource servers like third-party web applications
- Used by Google, Microsoft, Facebook and other sites to allow users to share elements of their identity or account information while authenticating via the original identity provider
OAuth
- An open-source standard for decentralized authentication
- Users create credentials with an identity provider like Google then sites (relying parties) use that identity
OpenID
Combines the OpenID authentication and OAuth authorization into a single protocol
OpenID Connect
- OAuth Component
- The user authenticating
Resource Owner
- OAuth Component
- Applications that users want to use
Client
- OAuth Component
- Servers owned by the identity provider
- Authenticates the resource owner
Authorization Server
- OAuth Component
- The server the client wants to access in behalf of the resource owner
Resource Server
Allows an organization to leverage a cloud service for identity management
Identity as a service (IDaaS)
- Protocol used for interfacing and querying directory service information
- Uses TCP/UDP port 389
- Queries transmitted in cleartext
Lightweight directory access protocol (LDAP)
- Third party authentication service
- Uses AES symmetric encryption and mutual authentication of both clients and servers
- Protects against network sniffing and replay attacks
- Most common single sign-on method used in organizations
Kerberos
- Kerberos term
- A unique identity
- i.e. user and/or service
Principal
- Kerberos term
- The group of systems (domain) Kerberos has authority over
Realm
- Kerberos term
- Encrypted message that provides proof that a subject is authorized to access an object
- Contains client identity, service ID and etc.
Ticket
- Kerberos term
- The heart of Kerberos where tickets and access is granted
Key Distribution Center (KDC)
The Key Distribution Center (KDC) consists of what two servers?
Authentication Server (AS) and Ticket Granting Server (TGS)
- Kerberos term
- Confirms that a known user is making access request to a known service and issues a service ticket
Ticket Granting Server (TGS)
- Kerberos term
- Confirms that the user is making the access request and issues out a Ticket Granting Ticket (TGT)
Authentication Server (AS)
- Kerberos term
- Provides proof that a subject has authenticated through a KDC and is authorized to request tickets to access other objects
Ticket Granting Ticket (TGT)