SlideShare ist ein Scribd-Unternehmen logo
1 von 9
DOMAIN 1: Access Control
# 1.03
CISSPills Table of Contents
 Federated Identity
 Markup Languages
 AAA Protocols
CISSPills Federated Identity
Identity Management is the management of user identities and their credentials. Federated
Identity extends this beyond a single organisation and represents a portable identity, and its
associated entitlement, that can be used across business boundaries. Multiple organisations can
join a federation, or group, where they agree upon a method to share identities among them.
Users in each organisation can log on once in their own organisation and their credentials are
matched with a federated identity. They can use this federated identity to access resources in
any other organisation within the federation.
Users authenticate to Organisation A
Users are authenticated to
Organisation B
Users are authenticated to
Organisation C
Users are authenticated to
Organisation D
CISSPills Markup Languages
Having multiple organisations communicating together can pose numerous challenge because
each company has different infrastructures, systems, etc. For this communications to work, it is
key finding a common language that allows the organisation to talk to each other.
A markup language is a way to structure text and data, as well as to instruct how these will be
viewed and used. Markup languages also enable interoperability, which in turns allow different
systems (and organisations) to interoperate. Below is a list of common markup languages:
 Extensible Markup Language (XML): is a universal and foundational standard that provides
a structure for other independent markup languages to be built, while still allow for
interoperability. Several markup languages have been derived from XML and each of them
has its own functionalities; however, if they follow the core rules of XML, then they are
interoperable;
CISSPills Markup Languages (cont’d)
 Security Provisioning Markup Language (SPML): is an XML-based framework designed
to exchange user information for federated identity single sign-on. It’s based on the
Directory Service Markup Language (DSLM), which can display LDAP-based directory
service information in an XML format. SPML allows for the automation of user management
(e.g. account creation, deletion, etc.), as well as access entitlements. There are three
component making up SPML: the Requesting Authority (RA) - which is the entity making
the request, the Provisioning Service Provider (PSP) – which responds to the entity
request and the Provisioning Service Target (PST) – which carries out the provisioning
activity on the target system;
 Security Assertion Markup Language (SAML): is an XML-based language used to
exchange authentication and authorisation information among federated organisations. In
SAML, users (called principals) authenticate against an entity called Identity Provider
(IdP); while the other entities, belonging to the same federation but consuming the
authentication performed by the IdP, are called Service Providers (SP);
 Extensible Access Control Markup Language (XACML): is used to define security policies
and access rights in XML format; it’s usually used to implement Role-Based Access Controls.
It provides assurance that the same rights are granted to different roles across the entities
within the same federation. XACML is both an access control policy language and a
processing model to interpret and enforce such policies.
CISSPills AAA Protocols
Some protocols are designed to provide Authentication, Authorisation and
Accountability (AAA). They are usually deployed with remote access systems (e.g.
dial-up and VPNs) and provide centralised access control.
 Remote Authentication Dial-In User Service (RADIUS): is a client-server
protocol. The access server (e.g. a VPN concentrator) requires the user’s
username and password and then passes them to the RADIUS server, which
verifies if the credentials are correct.
The client and the access server negotiate the authentication protocol (PAP, CHAP,
etc.) over a PPP connection; whilst the access server and the RADIUS server talk
over the RADIUS protocol. RADIUS supports user profiles, which can be
assigned to authenticated users to control what resources they can access.
RADIUS can also be implemented with callback security; if deployed in this way,
once users successfully log in, the RADIUS server terminates the connection and
initiates a call back to the user’s predefined phone number.
RADIUS only encrypts the exchange of password and doesn’t encrypt the entire
session.
CISSPills AAA Protocols (cont’d)
 Terminal Access Controller Access Control System (TACACS): was designed
as an alternative to RADUS; it was later extended by Cisco (Extended TACACS –
XTACACS) as a proprietary protocol. A further version, TACACS+, was later
created as an open protocol; this last one is the most adopted version.
TACACS+ introduces several enhancements over its preceding versions, as well
as RADIUS:
 It separates the authentication, authorisation and accounting into separate processes,
which could be hosted on separate servers;
 It encrypts all the authentication information, not just the password;
 It support two-factor authentication;
 It uses TCP, which provides a higher level of reliability compared to UDP;
 It provides a higher level of granularity when it comes to controlling what users can do
once authenticated,
TACACS+ is a totally different protocol and is not backward-compatible with TACACS and
XTACACS.
CISSPills AAA Protocols (cont’d)
 Diameter: was designed upon the functionality of RADIUS and overcomes many
of its limitations. It provides the same AAA capabilities as RADIUS and TACACS,
but also provides more flexibility in terms of networks and protocols, including
Mobile IP and Voice over IP (VoIP).
Diameter consists of two portions: the base protocol, which defines header
formats, security options, commands and AVPs. The base protocol allows for
extensions to tie in other services. By doing so, the same protocol can be used to
interoperate with different networks.
RADIUS and TACACS are client-server protocols, which means that the clients
initiates the communication and the server cannot send unsolicited commands.
Diameter is instead a peer-to-peer protocol where both the client and the server
can initiate the communication.
CISSPills That’s all Folks!
We are done, thank you for the interest! Hope you have enjoyed these pills as much
as I have had fun writing them.
For comments, typos, complaints or whatever your want, drop me an e-mail at:
cisspills <at> outlook <dot> com
More resources:
 Stay tuned on for the next issues;
 Join ”CISSP Study Group Italia” if you are preparing your exam.
Brought to you by Pierluigi Falcone. More info about me on
Contact Details

Weitere ähnliche Inhalte

Was ist angesagt?

DEVNET-1132 Create B2B Exchanges with Cisco Connected Processes
DEVNET-1132	Create B2B Exchanges with Cisco Connected ProcessesDEVNET-1132	Create B2B Exchanges with Cisco Connected Processes
DEVNET-1132 Create B2B Exchanges with Cisco Connected ProcessesCisco DevNet
 
The Nex Generation of SOA
The Nex Generation of SOAThe Nex Generation of SOA
The Nex Generation of SOAMichael Ruiz
 
Part II - Summary of service oriented architecture (SOA) concepts, technology...
Part II - Summary of service oriented architecture (SOA) concepts, technology...Part II - Summary of service oriented architecture (SOA) concepts, technology...
Part II - Summary of service oriented architecture (SOA) concepts, technology...Mohammed Omar
 
SOA Security - So What?
SOA Security - So What?SOA Security - So What?
SOA Security - So What?Oliver Pfaff
 
Day1 : web service basics
Day1 :  web service basics Day1 :  web service basics
Day1 : web service basics Testing World
 
Applications Drive Secure Lightpath Creation Across Heterogeneous Domains
Applications Drive Secure Lightpath Creation Across Heterogeneous DomainsApplications Drive Secure Lightpath Creation Across Heterogeneous Domains
Applications Drive Secure Lightpath Creation Across Heterogeneous DomainsTal Lavian Ph.D.
 
Service-Finder presentation at ESTC2008
Service-Finder presentation at ESTC2008Service-Finder presentation at ESTC2008
Service-Finder presentation at ESTC2008servicefinder
 
Context And Concept Of Web Services
Context And Concept Of Web ServicesContext And Concept Of Web Services
Context And Concept Of Web ServicesFatih Taşkın
 
Soa Symposium Rest Style Soa Governance 2009 10 23 Bc
Soa Symposium   Rest Style Soa Governance 2009 10 23   BcSoa Symposium   Rest Style Soa Governance 2009 10 23   Bc
Soa Symposium Rest Style Soa Governance 2009 10 23 BcfuzzyBSc
 
Solved_SolutionSheet_DocCapDist
Solved_SolutionSheet_DocCapDistSolved_SolutionSheet_DocCapDist
Solved_SolutionSheet_DocCapDistBob Wood
 
Service Oriented Architecture
Service Oriented ArchitectureService Oriented Architecture
Service Oriented ArchitectureLuqman Shareef
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...IEEEGLOBALSOFTTECHNOLOGIES
 
Collaboration in multicloud computing environments framework and security issues
Collaboration in multicloud computing environments framework and security issuesCollaboration in multicloud computing environments framework and security issues
Collaboration in multicloud computing environments framework and security issuesIEEEFINALYEARPROJECTS
 

Was ist angesagt? (17)

DEVNET-1132 Create B2B Exchanges with Cisco Connected Processes
DEVNET-1132	Create B2B Exchanges with Cisco Connected ProcessesDEVNET-1132	Create B2B Exchanges with Cisco Connected Processes
DEVNET-1132 Create B2B Exchanges with Cisco Connected Processes
 
Soa unit iv
Soa unit ivSoa unit iv
Soa unit iv
 
Web services
Web servicesWeb services
Web services
 
The Nex Generation of SOA
The Nex Generation of SOAThe Nex Generation of SOA
The Nex Generation of SOA
 
Part II - Summary of service oriented architecture (SOA) concepts, technology...
Part II - Summary of service oriented architecture (SOA) concepts, technology...Part II - Summary of service oriented architecture (SOA) concepts, technology...
Part II - Summary of service oriented architecture (SOA) concepts, technology...
 
SOA Security - So What?
SOA Security - So What?SOA Security - So What?
SOA Security - So What?
 
Day1 : web service basics
Day1 :  web service basics Day1 :  web service basics
Day1 : web service basics
 
Web services
Web servicesWeb services
Web services
 
Applications Drive Secure Lightpath Creation Across Heterogeneous Domains
Applications Drive Secure Lightpath Creation Across Heterogeneous DomainsApplications Drive Secure Lightpath Creation Across Heterogeneous Domains
Applications Drive Secure Lightpath Creation Across Heterogeneous Domains
 
Service-Finder presentation at ESTC2008
Service-Finder presentation at ESTC2008Service-Finder presentation at ESTC2008
Service-Finder presentation at ESTC2008
 
Context And Concept Of Web Services
Context And Concept Of Web ServicesContext And Concept Of Web Services
Context And Concept Of Web Services
 
Christine macqueen
Christine macqueenChristine macqueen
Christine macqueen
 
Soa Symposium Rest Style Soa Governance 2009 10 23 Bc
Soa Symposium   Rest Style Soa Governance 2009 10 23   BcSoa Symposium   Rest Style Soa Governance 2009 10 23   Bc
Soa Symposium Rest Style Soa Governance 2009 10 23 Bc
 
Solved_SolutionSheet_DocCapDist
Solved_SolutionSheet_DocCapDistSolved_SolutionSheet_DocCapDist
Solved_SolutionSheet_DocCapDist
 
Service Oriented Architecture
Service Oriented ArchitectureService Oriented Architecture
Service Oriented Architecture
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...
 
Collaboration in multicloud computing environments framework and security issues
Collaboration in multicloud computing environments framework and security issuesCollaboration in multicloud computing environments framework and security issues
Collaboration in multicloud computing environments framework and security issues
 

Ähnlich wie CISSPills #1.03

WSO2Con 2011: Introduction to Stratos
WSO2Con 2011: Introduction to StratosWSO2Con 2011: Introduction to Stratos
WSO2Con 2011: Introduction to StratosAfkham Azeez
 
WSO2con 2011: Introduction to Stratos
WSO2con 2011:  Introduction to StratosWSO2con 2011:  Introduction to Stratos
WSO2con 2011: Introduction to StratosAfkham Azeez
 
Important Terminology for the Users of Web-based Services
Important Terminology for the Users of Web-based ServicesImportant Terminology for the Users of Web-based Services
Important Terminology for the Users of Web-based ServicesHTS Hosting
 
Introduction to webservices
Introduction to webservicesIntroduction to webservices
Introduction to webservicesGagandeep Singh
 
Mattocks Ont Pragebx Rr 2004 12 082
Mattocks Ont Pragebx Rr 2004 12 082Mattocks Ont Pragebx Rr 2004 12 082
Mattocks Ont Pragebx Rr 2004 12 082Dr. Cupid Lucid
 
Mattocks Ont Pragebx Rr 2004 12 08
Mattocks Ont Pragebx Rr 2004 12 08Mattocks Ont Pragebx Rr 2004 12 08
Mattocks Ont Pragebx Rr 2004 12 08Dr. Cupid Lucid
 
Lotus Admin Training Part I
Lotus Admin Training Part ILotus Admin Training Part I
Lotus Admin Training Part ISanjaya K Saxena
 
From Cisco ACS to ISE
From Cisco ACS to ISE From Cisco ACS to ISE
From Cisco ACS to ISE Mahzad Zahedi
 
Web Based Secure Soa
Web Based Secure SoaWeb Based Secure Soa
Web Based Secure Soaijbuiiir1
 
Ogsi protocol perspective
Ogsi protocol perspectiveOgsi protocol perspective
Ogsi protocol perspectivePooja Dixit
 
Radius server,PAP and CHAP Protocols
Radius server,PAP and CHAP ProtocolsRadius server,PAP and CHAP Protocols
Radius server,PAP and CHAP ProtocolsDhananjay Aloorkar
 
Web services and SOA [Modified]
Web services and SOA [Modified]Web services and SOA [Modified]
Web services and SOA [Modified]Subin Sugunan
 
Open am and_radiantone
Open am and_radiantoneOpen am and_radiantone
Open am and_radiantoneJose R
 

Ähnlich wie CISSPills #1.03 (20)

Service view
Service viewService view
Service view
 
Web Service Extensions | Torry Harris Whitepaper
Web Service Extensions | Torry Harris WhitepaperWeb Service Extensions | Torry Harris Whitepaper
Web Service Extensions | Torry Harris Whitepaper
 
WSO2Con 2011: Introduction to Stratos
WSO2Con 2011: Introduction to StratosWSO2Con 2011: Introduction to Stratos
WSO2Con 2011: Introduction to Stratos
 
WSO2con 2011: Introduction to Stratos
WSO2con 2011:  Introduction to StratosWSO2con 2011:  Introduction to Stratos
WSO2con 2011: Introduction to Stratos
 
Ch08 Authentication
Ch08 AuthenticationCh08 Authentication
Ch08 Authentication
 
Important Terminology for the Users of Web-based Services
Important Terminology for the Users of Web-based ServicesImportant Terminology for the Users of Web-based Services
Important Terminology for the Users of Web-based Services
 
Introduction to webservices
Introduction to webservicesIntroduction to webservices
Introduction to webservices
 
SDP Glossary v2.0
SDP Glossary v2.0 SDP Glossary v2.0
SDP Glossary v2.0
 
Mattocks Ont Pragebx Rr 2004 12 082
Mattocks Ont Pragebx Rr 2004 12 082Mattocks Ont Pragebx Rr 2004 12 082
Mattocks Ont Pragebx Rr 2004 12 082
 
Mattocks Ont Pragebx Rr 2004 12 08
Mattocks Ont Pragebx Rr 2004 12 08Mattocks Ont Pragebx Rr 2004 12 08
Mattocks Ont Pragebx Rr 2004 12 08
 
Lotus Admin Training Part I
Lotus Admin Training Part ILotus Admin Training Part I
Lotus Admin Training Part I
 
From Cisco ACS to ISE
From Cisco ACS to ISE From Cisco ACS to ISE
From Cisco ACS to ISE
 
Soa
SoaSoa
Soa
 
Web Based Secure Soa
Web Based Secure SoaWeb Based Secure Soa
Web Based Secure Soa
 
Ogsi protocol perspective
Ogsi protocol perspectiveOgsi protocol perspective
Ogsi protocol perspective
 
Active directory
Active directoryActive directory
Active directory
 
Radius server,PAP and CHAP Protocols
Radius server,PAP and CHAP ProtocolsRadius server,PAP and CHAP Protocols
Radius server,PAP and CHAP Protocols
 
Restful api
Restful apiRestful api
Restful api
 
Web services and SOA [Modified]
Web services and SOA [Modified]Web services and SOA [Modified]
Web services and SOA [Modified]
 
Open am and_radiantone
Open am and_radiantoneOpen am and_radiantone
Open am and_radiantone
 

Mehr von Pierluigi Falcone, CISSP, CISM, CCSK, SABSA Foundation (8)

CISSPills #1.02
CISSPills #1.02CISSPills #1.02
CISSPills #1.02
 
CISSPills #1.01
CISSPills #1.01CISSPills #1.01
CISSPills #1.01
 
Annex 01
Annex 01Annex 01
Annex 01
 
CISSPills #3.06
CISSPills #3.06CISSPills #3.06
CISSPills #3.06
 
CISSPills #3.05
CISSPills #3.05CISSPills #3.05
CISSPills #3.05
 
CISSPills #3.04
CISSPills #3.04CISSPills #3.04
CISSPills #3.04
 
CISSPills #3.03
CISSPills #3.03CISSPills #3.03
CISSPills #3.03
 
CISSPills #3.02
CISSPills #3.02CISSPills #3.02
CISSPills #3.02
 

Kürzlich hochgeladen

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 

Kürzlich hochgeladen (20)

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 

CISSPills #1.03

  • 1. DOMAIN 1: Access Control # 1.03
  • 2. CISSPills Table of Contents  Federated Identity  Markup Languages  AAA Protocols
  • 3. CISSPills Federated Identity Identity Management is the management of user identities and their credentials. Federated Identity extends this beyond a single organisation and represents a portable identity, and its associated entitlement, that can be used across business boundaries. Multiple organisations can join a federation, or group, where they agree upon a method to share identities among them. Users in each organisation can log on once in their own organisation and their credentials are matched with a federated identity. They can use this federated identity to access resources in any other organisation within the federation. Users authenticate to Organisation A Users are authenticated to Organisation B Users are authenticated to Organisation C Users are authenticated to Organisation D
  • 4. CISSPills Markup Languages Having multiple organisations communicating together can pose numerous challenge because each company has different infrastructures, systems, etc. For this communications to work, it is key finding a common language that allows the organisation to talk to each other. A markup language is a way to structure text and data, as well as to instruct how these will be viewed and used. Markup languages also enable interoperability, which in turns allow different systems (and organisations) to interoperate. Below is a list of common markup languages:  Extensible Markup Language (XML): is a universal and foundational standard that provides a structure for other independent markup languages to be built, while still allow for interoperability. Several markup languages have been derived from XML and each of them has its own functionalities; however, if they follow the core rules of XML, then they are interoperable;
  • 5. CISSPills Markup Languages (cont’d)  Security Provisioning Markup Language (SPML): is an XML-based framework designed to exchange user information for federated identity single sign-on. It’s based on the Directory Service Markup Language (DSLM), which can display LDAP-based directory service information in an XML format. SPML allows for the automation of user management (e.g. account creation, deletion, etc.), as well as access entitlements. There are three component making up SPML: the Requesting Authority (RA) - which is the entity making the request, the Provisioning Service Provider (PSP) – which responds to the entity request and the Provisioning Service Target (PST) – which carries out the provisioning activity on the target system;  Security Assertion Markup Language (SAML): is an XML-based language used to exchange authentication and authorisation information among federated organisations. In SAML, users (called principals) authenticate against an entity called Identity Provider (IdP); while the other entities, belonging to the same federation but consuming the authentication performed by the IdP, are called Service Providers (SP);  Extensible Access Control Markup Language (XACML): is used to define security policies and access rights in XML format; it’s usually used to implement Role-Based Access Controls. It provides assurance that the same rights are granted to different roles across the entities within the same federation. XACML is both an access control policy language and a processing model to interpret and enforce such policies.
  • 6. CISSPills AAA Protocols Some protocols are designed to provide Authentication, Authorisation and Accountability (AAA). They are usually deployed with remote access systems (e.g. dial-up and VPNs) and provide centralised access control.  Remote Authentication Dial-In User Service (RADIUS): is a client-server protocol. The access server (e.g. a VPN concentrator) requires the user’s username and password and then passes them to the RADIUS server, which verifies if the credentials are correct. The client and the access server negotiate the authentication protocol (PAP, CHAP, etc.) over a PPP connection; whilst the access server and the RADIUS server talk over the RADIUS protocol. RADIUS supports user profiles, which can be assigned to authenticated users to control what resources they can access. RADIUS can also be implemented with callback security; if deployed in this way, once users successfully log in, the RADIUS server terminates the connection and initiates a call back to the user’s predefined phone number. RADIUS only encrypts the exchange of password and doesn’t encrypt the entire session.
  • 7. CISSPills AAA Protocols (cont’d)  Terminal Access Controller Access Control System (TACACS): was designed as an alternative to RADUS; it was later extended by Cisco (Extended TACACS – XTACACS) as a proprietary protocol. A further version, TACACS+, was later created as an open protocol; this last one is the most adopted version. TACACS+ introduces several enhancements over its preceding versions, as well as RADIUS:  It separates the authentication, authorisation and accounting into separate processes, which could be hosted on separate servers;  It encrypts all the authentication information, not just the password;  It support two-factor authentication;  It uses TCP, which provides a higher level of reliability compared to UDP;  It provides a higher level of granularity when it comes to controlling what users can do once authenticated, TACACS+ is a totally different protocol and is not backward-compatible with TACACS and XTACACS.
  • 8. CISSPills AAA Protocols (cont’d)  Diameter: was designed upon the functionality of RADIUS and overcomes many of its limitations. It provides the same AAA capabilities as RADIUS and TACACS, but also provides more flexibility in terms of networks and protocols, including Mobile IP and Voice over IP (VoIP). Diameter consists of two portions: the base protocol, which defines header formats, security options, commands and AVPs. The base protocol allows for extensions to tie in other services. By doing so, the same protocol can be used to interoperate with different networks. RADIUS and TACACS are client-server protocols, which means that the clients initiates the communication and the server cannot send unsolicited commands. Diameter is instead a peer-to-peer protocol where both the client and the server can initiate the communication.
  • 9. CISSPills That’s all Folks! We are done, thank you for the interest! Hope you have enjoyed these pills as much as I have had fun writing them. For comments, typos, complaints or whatever your want, drop me an e-mail at: cisspills <at> outlook <dot> com More resources:  Stay tuned on for the next issues;  Join ”CISSP Study Group Italia” if you are preparing your exam. Brought to you by Pierluigi Falcone. More info about me on Contact Details