Time
33 hours 23 minutes
Difficulty
Beginner
CEU/CPE
33

Video Transcription

00:00
Hello and welcome back the Siberia's 2019 cop T A security plus certification preparation course.
00:08
We're gonna continue our discussion on margarine before which in fact, is domain for and the top of discussion would be identity and access management.
00:17
Surprising enough. We have a brand new known object, which is 4.1, where we had to compare and contrast identity and access management concepts.
00:26
The first item on our agenda is a pre assessment quiz, and it reads asked Falls. Which of the following processes transpires when a user provides a correct user name and password? Is it a identification?
00:40
Be authentication, see authorization or D accounting.
00:45
If you select it be, you're absolutely correct, because authentication is the process that validates an identity. When a user provides their credentials, such as the user name and password, it is compared to those on file in a database on a local operating system or within an authentication server.
01:03
Continue on with this particular brand new learning objective, which again we're going to compare contrast identity and access management concepts
01:11
here again, awesome key concept, which encompasses this particularly objective, ranging from identification, authentication, authorization and accounting.
01:23
So let us turn our teacher toward access control. Now when you think about access control, basically it involves granting on the nine approval to use specific resource is
01:33
now within the contents. Excess control. You have physical access control, which consist of fencing, heart work, door locks and man chaps to limit contact with the dices.
01:42
Technical access control consist of technology with Scripture that limit uses on computers from access and data.
01:49
There are four standard access control models that you need to be aware of, which will be discussing an upcoming videos
01:59
now accident troll and able. An authorised person control access to areas and resource is in a given physical facility or computer based information system.
02:08
A key part of any X control system is the identification authentication of individuals. If you can't identify individual, everyone is in fact anonymous. If everyone is anonymous, there is no way you can control access to different resource is either. Everyone has access are no one has access
02:29
the overall process of identification, authentication authorization in other words, the user professors and identity
02:35
with the user name
02:36
and validates that it didn't about providing authentication, type information
02:40
and authentication system. What it does. It verifies the credentials, then access control such as permissions authorized to use it. Access researchers such as Out stored on the server. If these three steps do do not, in fact come together, the user is not able to access. Resource is protected with access control.
03:02
This brings us to access control. Terminologies. Now we're beginning. Look at these. We have literally basic four different columns where we have the action. We have the description. We have a scenario. Example. Then we have a D computer process. Now we're beginning. Look at unification.
03:19
First of all description is a review of the credentials. So the never a type the deliver driver shows their employees batch
03:27
the computer process to use a interest, their user name. So again, there's just one of many that's listed on this particular slide. We do. We gotta how that we are not going to highlight at this point in time.
03:38
Tendonitis toward the staff access control.
03:43
First thing in terms accident. So we have identification. Other words you present credentials. Example would be the deliver driver visiting his or her employees badge.
03:53
Then we have authentication is whether you actually check those credentials. Example will be examining the delivery drivers badge.
04:01
Then the authorization process is basically is entails. Granting permission to take action
04:09
example would be allowing that deliver driver here, he or she to pick up the package.
04:14
When you look at X can show you process, you have the subject, the subject literally, what he or she does. They present their credentials to the system
04:21
doing authentication price of what happened, that system it verifies. And it validates the credentials that, in fact, ensuring that they are authentic
04:30
authorization grants. Permission to that allow resource is
04:36
now. When you presented it into a system, that system want you to prove that is indeed you and not someone else. Where in authentication is the process ascertaining that somebody really is who he or she here, she claimed, professed to be.
04:55
Continue on with this particular topic In terms of subjective Carol, which deals specifically with comparing and contrast identity and access management concepts, let's take a look at some additional objectives again. Some topics Rupert tear turn out toward the definition. Other words that find exactly what motive factor authentication years, other words,
05:15
something You are
05:15
something you have
05:17
something you know
05:18
somewhere you are something you do
05:24
when we begin to look at the topic up. Multi factor authentication.
05:29
It's a security mechanism in which individuals authenticate room or than one require security and validation procedures.
05:35
More type of authentication is a built from the combination off physical, logical and biometric validation techniques used to secure a facility, product or service. So motor fact they get referred to use at least two different types of factors for authentication, the two different types of authentication factors might be a tightening password
05:56
and a thumbprint.
05:58
This brings us to five factness of authentication that you need to be aware that first, where I'm going to highlight doing this particular video is something you are.
06:06
Now. When you look at something, you are basically verified. What Byron mention, such as your fingerprints or your retina scan
06:14
something you have.
06:15
This includes the physical devices that are user prevent, possesses, in other words. Example includes a smartcard heart work, token memory card or a USB drive.
06:25
Something you know, this could be a password, person identification number, other words pen or past praise, for instance,
06:32
something you are
06:34
this includes and actionable characteristic of an individual examples our signature
06:40
and keystroke dynamics,
06:42
something you dio.
06:43
This includes an actual character myself, in a good example, signature and keystroke dynamics.
06:49
Then we turn our attention to what single factor authentication Now with single factor authentication, only one factor is use. Single factor. Authentication, in fact, is the simplest form authentication method with single factor. Authentication of person matches one credential to verify himself or herself online.
07:09
The most popular example of this would be a password. Other words, a credential
07:13
to your user name. Most of application. They uses this type of indication type method.
07:19
Continue our discussion of comparing a contrast identity and access magic concept again. Dis objective. What? We don't take a look at some additional topics, which encompasses this particular objective, ranging from federation single sign on to transit trust.
07:38
So taking a look again at what we call Federated access what that does that allows users and different networks to log on only once,
07:46
even if they are accessing multiple system. The system can be different operating system owned and operated by different types of organizations.
07:56
Then we have the security assertion, markup language, other words, a sampler.
08:01
It has a principle, has a dentist identity provider in the service about her.
08:05
Now when we look, for example, at the principle, the president is typical user that logs on to the system
08:11
if necessary, use a must or might request a principal identity from the identity provider
08:18
they didn't provide. It basically creates and maintains and maintains the dinning information for the principal.
08:26
The service provides provider is a survivor is the entity that provides a service to the press. Before example, a banking institution that host different banking services is the service provider.
08:39
The next one we have is called a secure
08:41
European system for application in a multi vendor environment. This was created as an alternative to curb owes in the European countries. However, with improvements to curable
08:52
the what we call the secure European system application in a motive an environment Israeli used, if not today,
09:01
then we have the kryptonite. Basically, this was created by IBM
09:05
as an alternative to curb ALS. It does not have as much network over here s horribles, however, like sesame other words, because the secure European system app for application A multi vendor environment
09:18
basically again
09:20
Israeli used today as well
09:24
because of the advanced modification and features that they've had with the curb owes of dedication.
09:31
This brings us to a term called trust transitive ity.
09:35
Before we could talk about the trust, models were talking a little bit about trust transit E
09:41
Trust Transit City is a control feature for trust relationships.
09:45
In essence, it allows you to trust other entities, would not directly knowing them,
09:50
and may allow you to extend the trust beyond domain, despite the fact that you may not trust them directly. So in this example here,
09:58
off trained to trust. Let's say, for example, if a trust be
10:03
that trust relationship exists and b trust see and that trust relationship exists, then transit trusts as well.
10:11
A. Because I trust be I could trust everybody you know and everybody you know, actress. And so you have this what we call transit trust relation between
10:20
a. N. C. Even though a doesn't know, see directly, it's using B as a root of trust, if you will, and using that to say OK because you trust, See now actress see as well the embers of this you can use is that the natural relationship as well.
10:39
You can say that well known, trusted non transit trust says, because you trust other domains. I'm not going to trust those. The borders are those domain that you trust, and that's none transit because it denies those trust relationships.
10:56
Then we have a term call one way trust, a warm where trust is a single trust relationship, where a trust be
11:03
all one way trust relationship are non transitive, and all non transit trust are one weight authentication quest can only be passed from the trusting domain to the trust domain.
11:15
This means that if a has a one way trust with B and B has a one where trust with C A does not have a trust relationship with C,
11:28
continue on with two way trust A to a trust said that we're going to trust each other, so I trust you and explicitly therefore you trust me,
11:37
and that's a two way trust. And because of that, what you have with this is a situation where devices and people can actually authenticate across domains based upon those trust relationship
11:50
to a trust says everything in here is going to trust everything in a resource domain is going to trust everything in that counter may and by Syverson.
12:00
And so you have people in If I sit in both domains, cross authenticated, if you have will between a different domains, and users can authenticate in both directions when you have what we call a two way trust.
12:13
This means that a thinner case of quest can be passed between the two domains and both direction. Some to a trust relationship can either be non transitive or transited pin upon the type of trust being created. All the main trust in the accurate force are two way other words. Transits trust when a new child domain is created.
12:31
What we have, in essence, is a two way transit trust.
12:33
It's automatic, created between a new child of Maine and the parent domain.
12:41
Now, transit trust is a two way translation that automatic create between a parent and child in a Microsoft active directory type environment.
12:50
This brings us to a post assessment Quist, and we have a statement here
12:54
and what you need to determine whether or not this statement is in fact a true statement or in fact, is it false,
13:01
and it reads, asked bottles
13:03
multi factor authentication refers to using two different types of factors for authentication purposes. Is this true or false?
13:11
If you should let the true you're absolutely correct
13:15
at this point in time. It brings us to our key takeaways from this particular video, and they are as follows. We learned that single sign on uses Federated identities to provide a more seamless experience for users when access and resource is.
13:30
We also learned that a two way trust says that everything in here is going to trust everything in the resource of Maine that's going to trust
13:35
everything in account may and by subversive
13:39
we don't get transit Transit City determines whether trust can be extended outside the two domains between which the trust was in fact formed.
13:48
We also learned that federal excess allows users and different networks and long and only wants, even if they're accessing multiple systems.
13:58
We learned that transit trust is a two way trust relationship automatic created between a parent and child and on Microsoft active directory forests.
14:05
We learned also that the one where trust is a unit directional authentication path created between two domains. Other words. The trust flows in one direction and access flows in the other
14:18
and our upcoming video. We'll continue our discussion by taking a look at a brand new one objective, which is 4.2, which is titled Giving a Scenario
14:26
and Stalling and Figure Did It and access services
14:31
look forward to seeing in a very next video?

Up Next

CompTIA Security+

Interested in the cybersecurity industry? The CompTIA Security+ is the gold standard for those looking to enter the cybersecurity industry. Join thousands of professionals who have gained this certification through this course and launched their careers in information security.

Instructed By

Instructor Profile Image
Jim Hollis
Independent Contractor
Instructor