IAM
IAM
- **Access Management:**
- **Role-Based Access Control (RBAC):** Access is granted based on user roles.
- **Attribute-Based Access Control (ABAC):** Access is based on user attributes
and policies.
- **OAuth 2.0:**
- **Definition:** Authorization framework allowing applications to obtain limited
access to user accounts.
- **Key Components:** Authorization server, resource server, client application,
and access tokens.
- **Biometric Authentication:**
- **Facial Recognition:** Verifies user identity through facial features.
- **Fingerprint Recognition:** Uses fingerprint patterns for authentication.
- **Identity Server:**
- **Role:** Manages user identities and facilitates secure authentication and
authorization.
- **Password Management:**
- **Hashing with Salt:** Technique for encrypting passwords to prevent
unauthorized access.
- **Best Practices:** Regularly update passwords, use complex passwords.
- **Practical Applications:**
- **Secure Access:** Implementing SSO and MFA for a secure login process.
- **Identity Management:** Managing user roles and permissions in a large
enterprise.
- **Compliance:** Ensuring IAM solutions meet regulatory requirements.
- **Documentation:**
- **Official Documentation:** Read official documentation for IAM protocols and
technologies (e.g., OAuth 2.0, SSO).
- **Whitepapers and Guides:** Review whitepapers and implementation guides from
IAM solution providers.
- **Online Resources:**
- **Websites:** Check out resources like [Okta’s
Blog](https://www.okta.com/blog/), [Microsoft Azure
Documentation](https://docs.microsoft.com/en-us/azure/active-directory/), and
[OAuth 2.0 Specification](https://oauth.net/2/).
- **Courses:** Explore online courses or tutorials on IAM concepts and
technologies.
- **Set Up MFA:**
- **Exercise:** Implement MFA on a personal account or test environment to
understand its setup and functionality.