Identity & Access Management Flashcards Preview

Game Changer > Identity & Access Management > Flashcards

Flashcards in Identity & Access Management Deck (25):

An unified login experience when accessing one or more systems

Single Sign On (SSO)


Involves the use of simply one of the three available factors solely in order to carry out the authentication process being requested

Single Factor Authentication


A version of the SAML OASIS standard for exchanging authentication & authorization data between security domains

Security Assertion Markup Language 2.0 (SAML)


An access control model that based on a list of predefined rules that determine what accesses should be granted

Rule-Based Access Control


An access control model that bases the access control authorizations on the roles that the user is assigned within an organization

Role-Based Access Control


A non-contact, automatic identification technology that uses radio signals to identify, track, sort and detect a variety of objects including people, vehicles, goods, & assets without the need for direct contact

Radio Frequency Identification (RFID)


Allows authorized security personnel to simultaneously manage & monitor multiple entry points from a single centralized location

Physical Access Control Systems (PACS)


A system that manages passwords consistently across the enterprise

Password Management System


Ensures that a user is who they claim to be. The more factors used to determine a person's identity, the greater the trust of authenticity

Multi-Factor Authentication


Access Control that requires the system itself to manage access controls in accordance with the organization's security policies

Mandatory Access Control (MAC)


A 48-bit number that is supposed to be globally unique

MAC Address


Protection mechanisms that limit user's access to information & restrict their forms of access on the system to only what is appropriate for them

Logical Access Controls


Developing standard for authenticating network users. Offers two key benefits: Functions in a multi-vendor network, & it does not transmit passwords over the network



Process of collecting & verifying information about a person for the purpose of proving that a person who has requested an account, a credential, or other special privilege is indeed who he or she claims to be, & establishing a reliable relationship

Identity Proofing


Cloud-based services that broker identity & access management functions to target systems on customer's premises and/or in the cloud

Identity as a Service (IDaaS)


Protects enterprise assets & provides a history of who gained access & when the access was granted

Facility Access Control


The process of establishing confidence in user identities electronically presented to an information system

Electronic Authentication


A hardware device that contains non-programmable logic & non-volatile storage dedicated to all cryptographic operations & protection of private keys

Cryptographic Device


Process of defining the specific resources a user needs & determining the type of access to those resources the user may have



Process of verifying the identity of the user



Systems that attempt to streamline the administration of user identity across multiple systems

Account Management Systems


Physical or electronic systems designed to control who, or what, has access to a network

Access Control Systems


Used to enter secured areas of a facility & are used in conjunction with a badge reader to read information stored on the badge

Access Badge


Provides the system with a way of uniquely identifying a particular user among all the users of that system

User ID


A local hardware encryption engine & secured storage for encryption keys

Trusted Platform Module