Authentication

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/29

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

30 Terms

1
New cards

What is Authentication?

verifying who you are

2
New cards

What is Knowledge based Authentication?

something you know such as a password, passphrase, or personal

identification number (PIN)

3
New cards

What is Ownership based Authentication?

something you have such as a smart card, key, badge, or token

4
New cards

Characteristics Authentication Mechanism

some attribute that is unique to you such as biometrics your fingerprints, retina, or signature

5
New cards

Location Authentication Mechanism

somewhere you are, the physical location while accessing resource

6
New cards

Action Authentication Mechanism

something you do or how you do it such as typing pattern

7
New cards

Synchronous token

Calculates a number at both the authentication server and the device, can be time or event based

8
New cards

Asynchronous token

usb token, smart card, memory cards

9
New cards

Static Measures

physiological, what you are

10
New cards

Dynamic Measures

behavioral, what you do

11
New cards

Concerns surrounding Biometrics

Accuracy, reaction time, and acceptability

12
New cards

Single sign-on (SSO)

A strategy that allows users to sign on to a computer or network once, their identification and authorization credentials allow them into all computers and systems where authorized

13
New cards

Federated access

enabling a user to log on only once to a network and then access multiple systems or applications on the same or different networks

14
New cards

Identity Federation

describe the technology, standards, policies, and processes that allow an organization to trust digital identities, identity attributes, and credentials created and issued by another organization

15
New cards

OpenID

An open standard that allows users to be authenticated by certain cooperating sites (relying parties) using a third party service

16
New cards

OIDF

OpenID Foundation is an international nonprofit organization of individuals and companies committed to enabling, promoting, and protecting OpenID technologies

17
New cards

ICF

Information Card Foundation is a nonprofit community of companies and individuals working together to evolve the Information Card ecosystem

18
New cards

OITF

Open Identity Trust Framework is a standardized, open specification of a trust

framework for identity and attribute exchange, developed jointly by OIDF and IC

19
New cards

OIX

Open Identity Exchange Corporation is an independent, neutral, international

provider of certification trust frameworks conforming to the OITF mode

20
New cards

AXN

Attribute Exchange Network is an online Internet-scale gateway for identity

service providers (party who issues the credential) and relying parties (who

accepts a digital identity credential) to efficiently access user asserted,

permissioned, and verified online identity attributes in high volumes at affordable

costs

21
New cards

OAUTH 2.0

an open-standard authorization protocol or framework that provides applications the ability for “secure designated access”

22
New cards

What are the four roles defined in OAuth 2.0?

Resource owner, client, resource server, authorization server

23
New cards

OAuth

It is a protocol designed to verify the identity of an end-user and grant permissions to a third party, results in a token

24
New cards

OpenID Connect (OIDC)

an authentication protocol for authenticating a user is who they say the are, currently supported by many popular web services, including Google, Paypal, Microsoft and Amazon

25
New cards

Certificate Authority (CA)

trusted third party that issues digital certificates

26
New cards

X.509

bind an identity to a public key using a digital signature

27
New cards

Public-Key Infrastructure (PKI)

The set of hardware, software, people, policies, and procedures needed to create, manage, store, distribute, and revoke digital certificates based on asymmetric cryptography

28
New cards

Kerberos

supports a large breadth of function, including single sign-on (SSO) implementations, and serves as the go-to authentication protocol for websites

29
New cards

Benefits of Kerberos

mature, meets modern distributed system requirements, architecturally sound, and is integrated into popular operating systems

30
New cards

Problems with Kerberos

performance