From the course: CCSP Cert Prep: 3 Cloud Platform and Infrastructure Security
Unlock the full course today
Join today to access over 24,900 courses taught by industry experts.
Identity and access management
From the course: CCSP Cert Prep: 3 Cloud Platform and Infrastructure Security
Identity and access management
- [Instructor] Identity and access management controls play an important role in any organization's information security program. Identity and access management is the practice of ensuring that computer systems have a clear picture of the identity of each individual or resource that's authorized to access those systems, and that they can control access in a way that both prevents unauthorized individuals from accessing resources, and also permits authorized individuals to perform legitimate actions. Now, the concept of identity can be a little confusing when we discuss it in the theoretical language of identity and access management professionals. Let's look at some of this terminology by using the example of a college campus. First, an entity is the foundation of the identity model. In the case of people, an entity is an actual person, and here we have two person entities, Alice and Bob. Each entity may have one or more…
Contents
-
-
-
-
-
(Locked)
Identity and access management2m 53s
-
(Locked)
Identification, authentication, and authorization3m 34s
-
(Locked)
Provisioning and deprovisioning3m 47s
-
(Locked)
Authentication factors4m 35s
-
(Locked)
Multifactor authentication2m 35s
-
(Locked)
SSO and federation3m 9s
-
(Locked)
Kerberos and LDAP5m 18s
-
(Locked)
SAML2m 35s
-
(Locked)
OAuth and OpenID Connect2m 55s
-
(Locked)
Security service providers2m 38s
-
(Locked)
Identity as a Service (IDaaS)2m 50s
-
(Locked)
Privileged access management2m 31s
-
(Locked)
-
-