Authentication, Authorization, & Accounting 1.2 Flashcards

(7 cards)

1
Q

Elements of AAA framework

A

Identification- This is who you claim to be. Usually your username.

Authentication- Prove who you say you are. Password and Authentication factors.

Authorization- Based on Your identification and authentication.

Accounting- Resources used: Login time, data sent and received logout time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Authenticating people ex (SEE video)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authenticating systems process

A

Must manage many devices. Devices you will never physically see.

A system can’t type a password. And you may not want to store one.

To truly authenticate a device you need to put a digitally signed certificate on the device.

Other business processes rely on the certificate. Access to the VPN from authorized devices. Management software can validate the end devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Certificate authentication process (VID example in video)

A

A organization has a trusted certificate authority (CA),

The organization creates a certificate for a device and digitally signs the certificate with the organizations CA.

The certificate can now be included on a device as an authentication factor. The CA’s digital signature is used to validate the certificate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How to authorize with authorization models

A

The user or device has not authenticated,

Users and services —> data & applications. Associating individual users to access rights does not scale.

Put an authorization model in the middle. Define by roles, organizations, attributes, ETC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

No authorization model

A

A simple relationship. User—> resource.

Some issues with this model. difficult to understand why an authorization may exist. Does not scale.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Using an authorization model

A

Add an abstraction. Reduce complexity. Create a clear relationship between the user and the resource.

Administration is streamlined. Easy to understand the authorizations. Support any number of users or resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly