Isa - GRP-6 Identity Access Management
Isa - GRP-6 Identity Access Management
Management
Group 6
Table of contents
01 02 03
Authentication Authentication Authorization
Factors
04 05
Accounting Authentication
Systems
Table of contents
06 07 08
Access Control Mandatory Other Access
Acess Control Control Models
09 10
Access Control User
Mechsnisms Management
Table of contents
11 12
Password Point to point
Management Authentication
Identity Access
Management
Identity and access management (IAM) is a
framework of business processes, policies and
technologies that facilitates the management of
electronic or digital identities.
Systems used for IAM include single sign-on systems,
two-factor authentication, multifactor authentication
and privileged access management.
01
Authentication
What is
Authentication
Authentication is the process of verifying a user or device
before allowing access to a system or resources.
Knowledge Factor
- something you know, e.g., password
Possession Factor
– something you have, e.g., mobile phone
Inherence Factor
– something you are, e.g., fingerprint
03
Authorization
What is Authorization
Protocol Management
Why Authentication is
Important
There is no organization, system, network, website, or server in today’s modern world that does
not require some form of authentication. If they are not, they are putting themselves at risk of
attacks that could result in the misappropriation of their resources and sensitive data at the
very least.
06
Access Control
Access control
Access control is an essential element of security that determines who is allowed to
access certain data, apps, and resources—and in what circumstances. In the same
way that keys and preapproved guest lists protect physical spaces, access control
policies protect digital spaces. In other words, they let the right people in and keep
the wrong people out.
Access control policies rely heavily on techniques like authentication and authorization,
which allow organizations to explicitly verify both that users are who they say they
are and that these users are granted the appropriate level of access based on context
such as device, location, role, and much more.
Password Management
Administrator account – The administrator can do everything with the computer and can go
anything he or she desires – essentially giving them control over the entire computer,
including other accounts. The administrator account can never be disabled or deleted.
Standard account – Users with standard accounts can install programs and hardware, change
pictures and related personal data, and create, change, or remove his or her password. Guest
account.
Strong passwords:
❖ are a minimum of 8 characters in length, it’s highly
recommended that it’s 12 characters or more
• Network Control Protocols (NCPs) − These protocols are used for negotiating the
parameters and facilities for the network layer. For every higher-layer protocol
supported by PPP, one NCP is there. Some of the NCPs of PPP are −
✓ Internet Protocol Control Protocol (IPCP)
✓ OSI Network Layer Control Protocol (OSINLCP)
✓ Internetwork Packet Exchange Control Protocol (IPXCP)
✓ DECnet Phase IV Control Protocol (DNCP)
✓ NetBIOS Frames Control Protocol (NBFCP)
✓ IPv6 Control Protocol (IPV6CP)
PPP Frame
PPP Frame
PPP is a byte - oriented protocol where each field of the frame is
composed of one or more bytes. The fields of a PPP frame are −
• Flag − 1 byte that marks the beginning and the end of the frame. The bit pattern of the flag is
01111110.
• Protocol − 1 or 2 bytes that define the type of data contained in the payload field.
• Payload − This carries the data from the network layer. The maximum length of the payload field
is 1500 bytes. However, this may be negotiated between the endpoints of communication.
• FCS − It is a 2 byte or 4 bytes frame check sequence for error detection. The standard code
used is CRC (cyclic redundancy code)