Access control and identity management is crucial to maintaining and secure environment. Various hardware controls like RADIUS, TACACS+ and XTACACS are covered, along with directory services and authentication services like Kerberos, LDAP, SAML, and Secure LDAP. The differences between identification, authentication, and authorization are covered, along with the various tools used to ensure users are connected securely with access to resources they need. Technologies and concepts including tokens, multi-authentication, TOTP, HOTP, CHAP, and PAP are covered, along with authentication factors.
Chris is a lifelong learner and professional information technologist, trainer and IT Manager. Married with 3 children, Chris is interested in martial arts, working out, spending time with family and friends and being creative whenever possible.
Authentication, Authorization, and Access Control Hey. Welcome back to Pluralsight. I'm your instructor, Christopher Rees, and in this module we're going to cover Authentication, Authorization, and Access Controls. Now this is a big module with a lot of information, a lot of important things that you need to understand conceptually, so that you can answer questions properly and kind of understand how everything fits together. In this module we're going to cover a number of things, six main areas, and it's going to be identification, authentication, authentication factors, authorization, federation, and then lastly, transitive trust and authentication, so how those things kind of tie into each other. All of these areas have obviously discreet components, we're going to cover each of these in more detail, then at a high level these are the main six areas that we're going to cover, so let's go ahead and get started.
Account Management Security Controls Hey. Welcome back to Pluralsight. I'm you're instructor, Christopher Rees, and in this module we're going to cover Account Management and Security Controls. In this module we're going to cover six main areas and that is users with multiple accounts or multiple roles and/or shared accounts, something that we really want to avoid whenever possible. We'll talk about account policy enforcement, we'll talk about group based privileges, why that's better than managing individual users. We'll talk about user assigned privileges and again, why group based privileges is better, easier to manage. We'll talk about user access reviews and then continuous monitoring, why it's important from a security perspective. Let's go ahead and get started.