network authentication

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/8

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

9 Terms

1
New cards

SAML

Security Assertion Markup Language

SAML assertion written in extensible markup language XML.

2
New cards

Communications are established

Using HTTP/HTTPS and the Simple object Access Protocol (SOAP)

3
New cards

Secure tokens are assigned

ASSIGNED XML signature specification .the use of a digital signature allows the relying party to trust identity provider

4
New cards

SAML implementation example

AWS Amazon Web Services which functions as a SAML relying party. Allows companies using AWS to develop cloud applications to manage their customer’s user identities and provide them with permissions in AWS without having to create accounts for them on AWS directly.

5
New cards

Kerberos

Kerberos is named after three headed dog Cerberus because it consists of three parts

Client(which requests service)

Server (from which the service is requested)

Key distribution center (KDC) to vouch for identity

6
New cards

KDC - key distribution center

two services that makes it up

Authentication Service

Ticket Granting service

7
New cards

KDC - Authentication Service

Responsible for authenticating user logon requests, more generally users and services can be authenticated. Collectively referred to as principals

First step of logon is to authenticate with a KDC server (implemented as a domain controller)

8
New cards

KDC - ticket granting ticket

To access resources within the domain, client requests a service ticket ( a token that grants access to a target application server) by supplying the ticket granting ticket to the ticket granting service (TGS)

9
New cards