Unit-2 Identity and Access Management
Unit-2 Identity and Access Management
The basic concepts and definitions of IAM functions for any service:
Authentication: Authentication is the process of verifying the identity of a
user or system . Authentication usually suggest a more robust form of
identification.
Authorization: Authorization is the process of determining the privileges the
user or system is entitled to once the identity is established. In the context of
digital services, authorization usually follows the authentication step and is
used to determine whether the user or service has the necessary privileges
to perform certain operations—in other words, authorization is the process
of enforcing policies.
Auditing: Auditing is the process of review and examination of
authentication, authorization records, and activities to:
determine the adequacy of IAM system controls,
verify compliance with established security policies and procedures (e.g.,
separation of duties)
detect breaches in security services (e.g., privilege escalation), and -
recommend any changes that are indicated for countermeasures.
IAM Architecture and Practice
In this way, XACML is used to convey the evaluation of policies against access
decision requests.
Open Authentication (OAuth)