Week 3 | |||||||
---|---|---|---|---|---|---|---|
Read Chapter 2 | |||||||
Chapter 3 – Investigating Identity and Access Management | |||||||
Action – Ian’s Book | Key Elements | ||||||
|
Identity and Account Types Access Control Schemes Privilege Access Management AAA Servers and their clients Location Based Authentication Impossible Time Travel Risky Logins Kerberos Authentication Federation Services Authentication Open Authentication (OAuth) Security Tokens and Devices – TOTP/HOTP Certificate Based Authentication Linux Permissions Biometric Authentication and Errors Password Policies |