Identity and Access Management - CompTIA Security+ SY0-701 - 4.6

Identity and Access Management - CompTIA Security+ SY0-701 - 4.6

Understanding Identity and Access Management (IAM)

Overview of IAM

  • The use of applications spans various systems and locations, including desktops, laptops, and mobile devices. Data can be stored locally, in data centers, or in the cloud.
  • Different types of users (employees, vendors, contractors, customers) require tailored access to data. Proper permissions are crucial for security; this is known as Identity and Access Management (IAM).

IAM Process

  • IAM encompasses the entire lifecycle of user access—from initial request to removal during offboarding. Changes may occur at various points due to role changes within the organization.
  • Users typically authenticate using a username and password or other factors. Monitoring access is essential for security compliance and best practices.

User Account Management

  • The IAM process starts with creating a user account and ends with its deactivation. This includes onboarding/offboarding as well as adjustments for promotions or departmental transfers.
  • Key information in IAM includes user names, attributes, group permissions, and application access rights.

Provisioning and Deprovisioning

  • Provisioning involves assigning appropriate permissions necessary for job functions while preventing excessive access rights—e.g., not granting admin rights indiscriminately.
  • Mandatory access control often associates users with groups that define their permissions; new hires are added to relevant groups based on their needs.

Security Measures in IAM

  • User-created documents remain private by default unless shared explicitly. Limiting OS access prevents unauthorized changes by users or malware.
  • Identity proofing verifies a user's identity during account creation through formal processes like resolution to ensure proper permission assignment.

Authentication Processes

  • Users must provide authentication details such as passwords along with additional validation methods like security questions during login attempts.
  • Verification may involve government-issued IDs or automated checks against credit reports to confirm identity before granting network resource access.

Centralized Authentication Systems

  • Authentication begins when clients send credentials to a central server (e.g., VPN concentrator). Successful validation allows resource access.
  • Single Sign-On (SSO) enables users to log in once for seamless access across multiple resources without repeated credential entry.

Authentication and Authorization Protocols

Overview of Single Sign-On (SSO) and Authentication

  • Users have access to resources for 24 hours before needing to re-authenticate for SSO. This requires login credentials that support SSO.
  • LDAP (Lightweight Directory Access Protocol) is a common authentication protocol used for accessing large data directories on networks, based on the X.500 specification by ITU.

Understanding LDAP Structure

  • LDAP was developed as an efficient alternative to the older Directory Access Protocol (DAP), allowing better compatibility with various operating systems.
  • Distinguished names in LDAP follow a standard format, starting with an attribute followed by its value, enabling structured organization within a directory information tree.

Directory Information Tree

  • The directory information tree organizes components like countries, organizations, departments, and individual devices into a hierarchical structure known as leaf objects.

Introduction to SAML

  • SAML (Security Assertion Markup Language) facilitates user authentication to third-party databases without maintaining separate user databases.
  • A basic SAML process involves three devices: client device, resource server, and authorization server; it starts when the client requests access to a URL.

SAML Authentication Process

  • If not logged in, the resource server sends an encrypted SAML request to the authorization server after which the user provides credentials.
  • Upon successful credential verification, the authorization server generates a SAML token that allows access to resources on the resource server.

OAuth Framework for Modern Systems

  • OAuth is an authorization framework designed for modern mobile systems that determines what resources users can access post-authentication.
  • Often paired with OpenID for combined authentication and authorization processes; OAuth was developed by major industry players for broad accessibility across devices.

Example of OAuth in Action

  • An example includes using Zapier to access Google account resources where users authorize third-party applications through OAuth permissions.

Federation as an Alternative Login Method

  • Federation enables network access without local authentication databases; users can log in using existing accounts from services like Twitter or Facebook instead of creating new ones.

Interoperability Considerations

VPN Concentrator and Authentication Options

Integration with LDAP Servers

  • The VPN concentrator supports access to an LDAP server for authentication, making it compatible with existing company resources.
  • If a company has an Active Directory server or another type of LDAP server, this setup is ideal for the VPN concentrator's requirements.

OAuth and API Authentication

  • When installing new applications that utilize OAuth for authorization, it's essential to provide authentication through an API (Application Programming Interface).
  • This process involves passing authentication information to OAuth, which is crucial for proper authorization within the application.
Playlists: Page 4
Video description

Security+ Training Course Index: https://professormesser.link/701videos Professor Messer’s Course Notes: https://professormesser.link/701notes - - - - - An important aspect of security is to match the right permissions to the right people at the right time. In this video, you'll learn about IAM (Identity and Access Management), account provisioning, permission assignments, single sign-on, and more. - - - - Subscribe to get the latest videos: https://professormesser.link/yt Calendar of live events: https://www.professormesser.com/calendar/ FOLLOW PROFESSOR MESSER: Professor Messer official website: https://www.professormesser.com/ Twitter: https://www.professormesser.com/twitter Facebook: https://www.professormesser.com/facebook Instagram: https://www.professormesser.com/instagram LinkedIn: https://www.professormesser.com/linkedin