Topic 6 - Identity & Access Management
Topic 6 - Identity & Access Management
Topic 6 - Identity & Access Management
Topic 6
Identity and Access Management (IAM)
Topic Reading
• Interact content.
Important of Identity & Access Management (IAM)
• Many of these exist but the following are more salient for our purposes.
• 802.1x
• IEEE standard for NAC and authenticates devices wanting to connect to
a network.
Authentication & Authorization Technologies
• Kerberos
• Designed for untrusted networks.
• Uses authentication to shield its authentication traffic!
Single Sign On Authentication
• Identity management.
– Using a single authenticated ID to be shared across multiple networks.
• One-factor authentication.
– Use of single credential.
• Two-factor authentication.
– 2 different credentials.
• Three-factor authentication.
– 3 different credentials.
– Very secure.
Authentication Factors
• A Scheme/Model definition:
• The owner and custodian are responsible for managing access controls.
• In the original MAC model, all objects and subjects were assigned a
numeric access level.
• The access level of the subject had to be higher than that of the object in
order for access to be granted.
Discretionary Access Control (DAC)
• A user has total control over any objects that they own.
• Along with the programs that are associated with those objects.
• In the DAC model, a subject can also change the permissions for other
subjects over objects.
Discretionary Access Control (DAC) Weaknesses
• Objects are set to be a certain type, to which subjects with that particular
role have access.
Benefits of Role-Based Access Control
• Enhancing compliance.
• Reducing costs.
• Rule Based Access Control is often used for managing user access to one
or more systems (SSO).
Access Control Models Summary