Time
35 hours 10 minutes
Difficulty
Advanced
CEU/CPE
8

Video Transcription

00:00
Hello and welcome to Sigh Berries Cop Tia, Certified of Van Security practice. Nurse certification progression. Course.
00:09
This is a continuation of all marginal attend. We're just tired. I didn't imagine it
00:14
here again on objectives which encompasses Model 10. What we're gonna do not turn out his tour, The discussion off. Operate in a network trust architectures.
00:27
Now let's take a look at the lone objectives and the order in which will be covered doing this particular presentation, we began by first discussing one way trust relationships,
00:36
then two way trust relationship and lastly, transitive trust.
00:41
Before we get going with this particular presentation, perhaps his most appropriate, we begin by taking a look at a pre assessment course in and the course and is as follows.
00:51
What is a user or any taking action or assessing a resource? Such a database call. Is it a an object?
00:59
Be a subject.
01:00
See Access control or d trust
01:04
the sponsor. The bid
01:07
be a subject.
01:11
The first item on our agenda is called trust Transitive ity.
01:15
This basic determines whether trust can be extended outside the two domains between which the force was formed before we begin the prices. Actually discussing trust models.
01:26
We take a little bit time discussed. Trust transit. Vitti
01:30
When you think about this particular academic term, if basically control features trust relationships in allowing trust other in is without directly knowing them
01:41
it may be allow you to extend your trust between domain, despite the fact that they may not trust them directly. So an example here. Transit Trust says that in this case, if a trust be that trust relationship exists and B and C and that trust Liz exists, then transits. Trust says, Well,
02:00
a because you trust be trust everybody you know and everybody you trust our trust. And so you have this transit trust relationship here between A and C, even though a doesn't know, see directly it's using be as a root of trust, if you will, and using that to say okay,
02:20
because you trust See,
02:22
now I trust see as well. The inverse of this is the use that to the nachos relationship as well.
02:29
You can say that well, non treasures say it's because you trust other remains. I'm not going to trust those sub domains of those who made that you trust, and that's none. Transit because it denies those trust relationships
02:46
their trust type and is assigned direction of thanks to trust path that's used forthe indication.
02:52
A trust path is a serious of trust relationship that authenticate requests must follows. Authentication must request miss model between domains before user can access resource in another main, the security system under the main control of must determine whether the trusted domain remain that remain. That that contains a resource
03:10
that they use is trying to access.
03:12
Has a trust relationship with the trust Germaine. Other words they use a longer coming to determine this. The security system computes to trust path between a domain controller in the trust domain and if the main controller in the trusted domain
03:25
eager is important. Computers are connected together using networks and different types of networks provide different levels of trust. Primary. There are four types of trust architectures the Internet,
03:38
the Internet and the excellent, as well as the D. M Z or permanent network. The security practice Inner other words of certified advanced code of practice is expected to understand all of them. The blow type of trust to discuss arts following turn to discuss warmer trust relationships
03:53
two way trust relationship. In the end, transitive trust as well
03:59
that has to terms relate to access control. You have subject, and you have object.
04:03
A subject is a user entity taken action or excess. In a resource such as a database, an object is a term or resource being active on, for instance, a user access and a software application is a subject, and this software African would be the object. In some cases, that may change relationship
04:24
and such an event and object becomes a subject and then reverses roles again.
04:28
For instance, they use the subject accesses an application requesting information. The application, which again is the object in an effort to respond to using other words of subject, requires information from the database.
04:41
The application now becomes a subject to the database on the worst object. Once the data is retrieved, the advocates of once again reverts to the object road and respond to the user, which is getting the subject.
04:58
Now. One way trusts is a single trust relationship where the main a trust be
05:04
all one word. Trust relations are non transit and all non transit trust all one way authentication request can only be passed from the trust in the main to the trust domain. This means that if B has a warmer trust, would be domain be in other words and the main
05:21
B has a one. We trusted the main seat. The maid does not have a trust relationship work. See,
05:30
when we look at two way trust, it says, we're going to trust each other. So I trust you and implicitly, therefore you trust me. And that's two way trust.
05:41
And because that what you have with this situations, where the devices and people can actually authenticate across the main base up on those trust relationships to a trust, says something in here is going to have to trust
05:54
everything in this resource. The main is going to trust everything in the account domain and vice versa.
06:00
And you can have people advice in both the mains. Cross a dedicated, if you will between the different domains a user
06:09
can authenticate in both directions when you have a two way type trust established. This means that the syndicate's request can be passed between the two domains in both directions. Some to a relation can either be non transit or transit, depending on the type of trust that's being created. All the mains trust
06:28
in the accelerated force are two way
06:30
transit trust Watch New child Domain is Created. A two way transit trust is automatic reading between the new child of Maine and the parent domain.
06:43
This brings us to train. Just trust.
06:45
It's a two way relationship. Automatic created between parent and child remains in a Microsoft acted a rate for us what a new domain is created. It shares. Resource is with its parent, remain by default, enabling, and then they can't use the access resource in both the child and the parent.
07:01
A two inch wants to be thought of as a combination to
07:04
opposite facing one way trust so that the trusting and trusted the main, both church each other trust an access flow in both directions.
07:14
At this point time. Let's take a look at a post assessment question for this particular presentation, and the course in is as follows a two way trust relationship automatic created between a parent and a child domain end Microsoft Ignore the force is called a blank is eight or one we trust be a transit trust.
07:32
C a two way trust or D
07:34
authorization.
07:36
The great responses have been be a trans of trust
07:41
doing this particular presentation. We highlight it and discuss the term a one way trust relationship,
07:46
as was a two way trust relationship. And lastly, we discussed a transit trust
07:51
and our upcoming topic. We'll be taking a look at the topic off. Participate in identity management lifecycle. Look for to seeing the very next video.

Up Next

CompTIA CASP+

In this CASP+ certification course, you will learn all of the domains and concepts associated with the CompTIA Advanced Security Practitioner CAS-003 CASP+ Exam. Through this course you will be fully prepared to sit for your CompTIA CASP+ Exam!

Instructed By

Instructor Profile Image
Jim Hollis
Independent Contractor
Instructor