What are the three core components of the AAA framework?
Authentication, Authorization, Accounting
What does Authentication address in the AAA framework?
Verifies the user’s identity
What does Authorization determine in the AAA framework?
What resources the user can access
What does Accounting log in the AAA framework?
All security-related events
What is the role of ‘identification’ in the login process?
User claims a specific identity, usually by providing a username
How does a VPN concentrator handle user authentication when it doesn’t store credentials locally?
Sends username and password to a central AAA server
Why is it impractical to store passwords directly on devices in the field?
Security risks if the device is compromised
What is a Certificate Authority (CA)?
A device or software responsible for managing certificates
What is the primary function of a Certificate Authority?
Create and digitally sign certificates for devices
How does a device certificate help verify a company-owned laptop?
Confirms authenticity through a unique certificate signed by a trusted CA
What is the main problem with a ‘no authorization model’ approach?
Complex and time-consuming manual configuration of user rights
Define ‘abstraction’ in the context of authorization models.
Separating users from specific data and applications for streamlined administration
How does using groups in an authorization model solve scalability issues?
Users inherit permissions by being added to groups
Give an example of information logged by the Accounting component of the AAA framework.
Time logged in, data sent or received, time logged out
What is the AAA Framework?
Authentication, Authorization, and Accounting for managing access
What does the term ‘Accounting’ refer to?
Tracking and logging security-related events and user activities
What is the concept of ‘abstraction’ in authorization?
Separating users from specific data and applications
What is an AAA Server?
A central server that stores user credentials and processes requests
What is the process of Authentication?
Verifying the claimed identity of a user or device
What does Authorization determine?
Specific resources that an authenticated user can access
What is a Certificate Authority’s role in device authentication?
Issuing, signing, and managing digital certificates
What is a device certificate?
A digital document uniquely identifying a device
What is the initial step in the login process?
Identification
What are ‘Rights and Permissions’?
Privileges granted to a user or group for actions and resources