WEEK 2 - IDENTITY ACCESS MANAGEMENT (IAM)

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/39

flashcard set

Earn XP

Description and Tags

Comprehensive IAM Concepts: Definitions, Models, and Tools

Last updated 11:40 PM on 3/29/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

40 Terms

1
New cards

What is the main purpose of Identity and Access Management (IAM)?

To ensure only authorized people or devices can access systems and data

2
New cards

What does Authorization determine in IAM?

What actions or resources a user is allowed to access

3
New cards

Which IAM component keeps records of user actions to ensure compliance and responsibility?

Accountability

4
New cards

What is the primary purpose of Multi-Factor Authentication (MFA)?

To require multiple forms of verification to confirm identity

5
New cards

What is the main benefit of Single Sign-On (SSO)?

Users can log in once and access multiple applications

6
New cards

Which access control model grants permissions based on a person's job role?

Role-Based Access Control (RBAC)

7
New cards

What is the principle of Least Privilege?

Allowing users access only to the resources needed to perform their job

8
New cards

What is IAM?

IAM is a security system that ensures only the right people or devices can access an organization's apps, data, or systems.

9
New cards

Why does IAM matter?

IAM keeps sensitive information safe from hackers, prevents unauthorized access, and helps companies comply with regulations like GDPR or HIPAA.

10
New cards

What is the analogy for IAM?

IAM is like a school security guard who checks student IDs to ensure only registered students enter classrooms.

11
New cards

What are the key parts of IAM?

The key parts of IAM are Identification, Authentication, Authorization, and Accountability (IAAA).

12
New cards

What is Identification in IAM?

Giving each person or device a unique ID, like a username or badge number.

13
New cards

What is Authentication in IAM?

Checking if someone is who they say they are, usually with a password or other proof.

14
New cards

What is Authorization in IAM?

Deciding what someone can do after their identity is confirmed, like which apps they can use.

15
New cards

What is Accountability in IAM?

Keeping a record of what people do to ensure they follow rules.

16
New cards

What is the difference between Authentication and Authorization?

Authentication proves identity, while Authorization decides what you are allowed to do.

17
New cards

What is Multi-Factor Authentication (MFA)?

MFA asks for two or more proofs of identity to log in, making it harder for hackers to break in.

18
New cards

Why is MFA important?

If a hacker steals your password, MFA stops them by requiring something else, like a code from your phone.

19
New cards

What is Single Sign-On (SSO)?

SSO lets you log in once and access multiple apps without logging in again.

20
New cards

Why does SSO matter?

It's easier for users and safer because it reduces password reuse.

21
New cards

What is Federation in IAM?

Federation lets you use one organization's login to access another organization's systems.

22
New cards

Why is Federation important?

It makes it easy to work with other companies or cloud services securely.

23
New cards

What are Access Control Schemes?

Rules that decide who can access what based on their job or characteristics.

24
New cards

What is the Least Privilege Principle?

Giving people or devices only the access they need to do their job, nothing more.

25
New cards

What is Identity Lifecycle Management?

Managing a person's digital identity from when they join a company to when they leave.

26
New cards

What are Conditional Access Policies?

Rules that change access based on factors like location or device being used.

27
New cards

What is Identity Governance and Administration (IGA)?

A system to manage identities, set rules, and check if access follows company policies.

28
New cards

What is Zero Trust?

A security approach that doesn't trust anyone automatically, even inside the company.

29
New cards

What are IAM Tools?

Software that helps manage identities and access securely.

30
New cards

What is an example of an IAM tool?

Okta is a cloud tool for SSO, MFA, and identity management.

31
New cards

What is the analogy for Zero Trust?

It's like a bank vault that checks your ID every time you enter, even if you're a regular customer.

32
New cards

What is an example of Multi-Factor Authentication?

Okta's MFA might ask for your password and a code from the Okta Verify app on your phone.

33
New cards

What is an example of Single Sign-On?

With Okta SSO, you log in once to access apps like Google Workspace or Salesforce without re-entering credentials.

34
New cards

What is an example of Federation?

Okta lets your company's login work for apps like Zoom or Slack hosted by other organizations.

35
New cards

What is an example of Access Control Schemes?

Role-Based Access Control (RBAC) grants access based on job roles.

36
New cards

What is an example of the Least Privilege Principle?

Okta ensures employees only access apps they need and removes access when they change roles.

37
New cards

What is an example of Identity Lifecycle Management?

Okta automatically creates or removes user accounts in apps when employees join or leave.

38
New cards

What is an example of Conditional Access Policies?

Okta might require a phone code if you log in from a new country.

39
New cards

What is an example of Identity Governance and Administration?

Okta's dashboard shows who has access to apps and lets managers review permissions.

40
New cards

What is an example of Zero Trust?

Okta uses MFA and monitors logins to ensure only trusted users access apps.

Explore top notes

note
Act 1, Scene 3
Updated 1280d ago
0.0(0)
note
Chapter 12: Degenerative Disorders
Updated 1355d ago
0.0(0)
note
APES 5.6 Pest Control Methods
Updated 1141d ago
0.0(0)
note
APUSH Unit 6
Updated 329d ago
0.0(0)
note
BUSINESS SECTION 3
Updated 324d ago
0.0(0)
note
Nursing Fundamentals - Day
Updated 592d ago
0.0(0)
note
Gaffney S1 Finals
Updated 1178d ago
0.0(0)
note
Act 1, Scene 3
Updated 1280d ago
0.0(0)
note
Chapter 12: Degenerative Disorders
Updated 1355d ago
0.0(0)
note
APES 5.6 Pest Control Methods
Updated 1141d ago
0.0(0)
note
APUSH Unit 6
Updated 329d ago
0.0(0)
note
BUSINESS SECTION 3
Updated 324d ago
0.0(0)
note
Nursing Fundamentals - Day
Updated 592d ago
0.0(0)
note
Gaffney S1 Finals
Updated 1178d ago
0.0(0)

Explore top flashcards

flashcards
Intro to Leukemias
20
Updated 534d ago
0.0(0)
flashcards
Shoulder muscles
72
Updated 1142d ago
0.0(0)
flashcards
Aerospace systems
161
Updated 1190d ago
0.0(0)
flashcards
Flashcards pro zeměpis
80
Updated 317d ago
0.0(0)
flashcards
AP US Easy Test 1
29
Updated 959d ago
0.0(0)
flashcards
Sociology: Chapter 7
37
Updated 1116d ago
0.0(0)
flashcards
French Term 1 Exam
55
Updated 1115d ago
0.0(0)
flashcards
Intro to Leukemias
20
Updated 534d ago
0.0(0)
flashcards
Shoulder muscles
72
Updated 1142d ago
0.0(0)
flashcards
Aerospace systems
161
Updated 1190d ago
0.0(0)
flashcards
Flashcards pro zeměpis
80
Updated 317d ago
0.0(0)
flashcards
AP US Easy Test 1
29
Updated 959d ago
0.0(0)
flashcards
Sociology: Chapter 7
37
Updated 1116d ago
0.0(0)
flashcards
French Term 1 Exam
55
Updated 1115d ago
0.0(0)