Access-Control-Group-4
Access-Control-Group-4
X X X
Door 2
Keycard
Door 1 Access
Network Access
Active Directory
- Active Directory (AD) is a directory service
typically used in Windows networks to
control and track resources. AD is a
Microsoft technology that enables
centralized network management. Active
Directory relies upon the Lightweight
Directory Access Protocol (LDAP)
for its communications. While AD is
probably the largest deployed user of LDAP
other implementations for various operating
systems exist, including Apple Open
Directory, RH Directory Server, and Open
LDAP. LDAP is often used by internal
applications and process.
Privileged Identity Management (PIM)
Privileged Identity Management (PIM) is a
method of managing access to resources
such as locations, commands, audit reports,
and services. PIM aims to provide more
granular access control.
Privileged Access Management (PAM)
- Privileged Access Management (PAM) is a
framework for safeguarding identities with
advanced capabilities, such as superusers in
a *NIX system. PAM is common in the
Linux world, where it is used to control how
administrators log in.
- PAM supports many more features than the
older "become root and perform admin
tasks" model. With PAM passwords can be
set to expire, better auditing can be put in
place, and privilege escalation can be made
temporary.
Identity and Access Management (IAM)
- Identity and Access Management is a
framework for managing digital identities.
IAM manages the user database, logs when
users sign in and out, manages the creation
of groups or roles, and allows for the
assignment and removal of access privileges.
Unix File Permissions
From its inception, Unix was designed to be
a multi-user environment, and as such, a lot
of attention was paid to file permissions.
Every file in a Unix system has an owner
and a group. Each file also has permissions
for owner, group, and all users.
ACLs
- Access Control Lists (ACL) are used to
permit or deny access based on a
characteristic. They tend to be based on a
simple characteristic and either deny access
to anyone not on the list, allowlist, or deny
access to anyone who is on the list, denylist.
SSH Keys
- Secure Shell Server (SSH) supports the use
of asymmetric encryption keys for
authentication. Most severs support RSA,
DSA, and ECDSA keys, with RSA being the
most common. An SSH server maintains a
list of authorized keys, typically in
~/.ssh/authorized_keys, that can be used to
connect to the server. When a client
connects, the SSH server issues a challenge
asking the client to sign a random piece of
data using their private key.
Sessions and Cookies
- HTTP sessions can also be used to control
access to a resource. This is often employed
in web applications. Upon successful sign-
in, a user is given a cookie with a
cryptographically tamper resistant session
ID. Every request the user makes to that site
will include that cookie.
Single Sign On (SSO)
-Given the ubiquitous nature of web
applications, maintaining separate
usernames and passwords can be difficult
for users. A recent trend has been to support
Single Sign On, where one identity provider
is used to confirm that users are who they
claim to be. There are a few protocols that
make this possible, including SAML and
OAuth. SAML stands for Security Assertion
Markup Language and is an XML based
Single Sign On solution.
The SAML workflow centers around the
SAML identity provider or IDP. The
following steps take place to grant access to
a resource via SAML:
-OAuth is not technically a full-fledged
authentication protocol, but it is often used
as part of one. The following diagram
highlights the differences between OpenID
authentication and an OAuth flow:
Pseudo-Authentication using OAuth
valet key* go
Google –
The Identity Provider
& the API Provider