AAA (Authentication, Authorization & Accounting) lec1

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/71

flashcard set

Earn XP

Description and Tags

Flashcards covering the key concepts of Authentication, Authorization, and Accounting (AAA) as presented in the lecture notes.

lec1

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

72 Terms

1
New cards

What are the three components of AAA?

Authentication, Authorization, and Accounting

2
New cards

What question does Authentication answer?

Do you have the credentials necessary to access this system?

3
New cards

What question does Authorization answer?

Once authenticated, what do you have permission to do?

4
New cards

What question does Accounting answer?

Once authorized to access a resource, how much of the resource are you using?

5
New cards

Name three methods of Authentication.

What you know, What you have, What you are

6
New cards

What is Two-factor authentication?

Uses two of the above methods of authentication to prove an identity

7
New cards

Give an example of Two-factor authentication.

Password and a security token code

8
New cards

List some methods of Identification.

User ID (UID), Physical Object (e.g. - ATM card), Biometrics, Digital Certificates

9
New cards

List some methods of Proof of Identification

Passwords, Access Code (e.g. - PIN number), One-Time Tokens, Biometrics, Digital Certificates

10
New cards

Give examples of simple user ID strategies

Jeff, Bill, Milton, etc.

11
New cards

How are user IDs commonly generated for large groups of users?

Computer Generated abc123, dgu083, jsprankl1, etc.

12
New cards

What does LNI or ILN stand for?

LNI = Last name + first initial

ILN = first initial + last name

13
New cards

Why should user ID ≠ email address?

security purposes

14
New cards

What is the first rule of good passwords?

Don’t write passwords down!

15
New cards

What are some easy to guess passwords you should avoid?

Names of family members or pets, Birth dates, Anything within sight, Special interests

16
New cards

What is a good minimum password length?

Use at least eight characters

17
New cards

What is the optimal frequency for password changes?

Minimum 30 days, 90 days is optimal

18
New cards

What types of characters should be included in a secure password?

Mix case, if possible. Use non-alpha characters such as Numbers, special characters

19
New cards

What should you avoid for passwords?

Plain English passwords

20
New cards

What is a potential downside of strict password rules?

The more strict the password rules, the higher the chances users will violate the first rule of secure passwords

21
New cards

What is the recommended minimum length for secure passwords?

10 characters minimum

22
New cards

How should secure passwords be generated?

Randomly generated to include at least letters and numbers

23
New cards

Why is it important to use a different password for each site?

If one site gets compromised, the gained credentials can be used at other sites you visit

24
New cards

What type of service should you use to manage passwords?

Password management service

25
New cards

What are the two groups of Biometrics?

Physiological and Behavioral

26
New cards

Give some examples of Physiological Biometrics.

Includes fingerprints, hand scans, retina scans

27
New cards

Give some examples of Behavioral Biometrics.

Include speech, signature or keystroke recognition

28
New cards

What are the issues with Biometrics?

Issues with false negatives and false positives

29
New cards

What is a Digital Certificate?

Encrypted data file that uses a Certificate Authority to guarantee the identity of the holder. Also includes an encryption key for secure transmissions

30
New cards

What protocols exist to enable AAA functions?

Domain Logon, RADIUS, TACACS+, Diameter

31
New cards

Where are login credentials stored in a domain environment?

Stored in the directory as an account object

32
New cards

What is RADIUS?

Remote Authentication Dial In User Service

33
New cards

What is the function of a Network Access Server in RADIUS?

RADIUS client

34
New cards

What kind of protocols are used to remotely check credentials with RADIUS?

Separate protocols

35
New cards

What is TACACS+?

Terminal Access Controller Access-Control System (plus)

36
New cards

What transport protocol does TACACS+ use?

TCP instead of UDP

37
New cards

How does TACACS+ handle AAA functions?

Breaks each of the AAA functions into a separate process

38
New cards

What is TACACS+ typically used for?

Typically only used to access devices, not workstations/servers

39
New cards

What kind of transport protocol does Diameter use?

TCP

40
New cards

What kind of security does Diameter use?

IPSec or TLS

41
New cards

What are the two models that Diameter provides?

Stateful and stateless models

42
New cards

What is authorization accomplished through?

the use of permissions (or rights)

43
New cards

What is the best practice for assigning access permissions?

Assign access permissions to groups rather than individual users

44
New cards

What is a Resource Group?

Resources other than users can also be added to groups

45
New cards

Give an example of a resource group.

Printers could be added to a Printers group

46
New cards

What does ACL stand for?

Access Control List

47
New cards

Where are is ACLs attached to?

to the resource

48
New cards

What does an ACL contain?

Contain a list of authorized users and their authorization level

49
New cards

Where are ACL's used?

Windows and Netware Resource

50
New cards

Where was Kerberos developed?

MIT

51
New cards

What does Kerberos include?

Authorization mechanism

52
New cards

What is built into Active Directory?

Kerberos

53
New cards

What are the minimum servers required for Kerberos?

One Authentication Server (AS), One Ticket Granting Server (TGS), At least one Application Server

54
New cards

What is the role of the Authentication Server (AS) in Kerberos?

Authenticates the user and provides a Ticket Granting Token (TGT)

55
New cards

What is the role of the Ticket Granting Server (TGS) in Kerberos?

Authorizes the user and provides a Service Granting Ticket (SGT)

56
New cards

What are the two places to set permissions in Windows?

The file system itself, if allowed and the network share

57
New cards

What is the best practice for setting Windows permissions?

Set all permissions on the file system and allow everyone access the share

58
New cards

When should you enforce permissions on the share?

If you do not want the share to appear to a user unless the user has permissions to see it

59
New cards

Where are NTFS permissions set?

Through the Security tab on the Properties dialog box on the folder

60
New cards

When do share permissions apply?

When the resource is accessed over a network

61
New cards

What is the difference between Inherited and Explicit Permissions?

Permissions can be explicitly assigned instead of inherited

62
New cards

Can an explicit allow override an inherited deny?

No

63
New cards

What tool can be used to clear up confusion about permissions?

Effective Permissions tool

64
New cards

What does the Effective Permission Tool show?

Shows the effective, cumulative permissions for a user or group, as they apply to a resource

65
New cards

How does TACACS+ use authorization?

ACLs on the NAS device. The TACACS+ server tells the access server what ACL to use

66
New cards

How does Diameter support authorization?

Through the use of the NASREQ add-in application

67
New cards

What is accounting used for in network resource management?

The tracking of the consumption of network resources by users

68
New cards

What is accounting usually tracking?

Data usage

69
New cards

What is the purpose of using accounting?

Can be used for bill-back purposes

70
New cards

How does RADIUS track usage for accounting?

Uses Start and Stop packets

71
New cards

How does TACACS+ perform accounting?

Writes information to a log or a database

72
New cards

Which protocol has accounting built into the base protocol?

Diameter