2 cissp ® Official Study Guide Eighth Edition



Download 19,3 Mb.
Pdf ko'rish
bet564/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   560   561   562   563   564   565   566   567   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Service Authentication
Many services also require authentication, and they typically use a username and pass-
word. A service account is simply a user account that is created for a service instead of a 
person.
As an example, it’s common to create a service account for third-party tools monitor-
ing email in Microsoft Exchange Server. These third-party tools typically need permission 
to scan all mailboxes looking for spam, malware, potential data exfiltration attempts, and 
more. Administrators typically create a Microsoft domain account and give the account the 
necessary privileges to perform the tasks.
It’s common to set the properties of the account so that the password never expires. For 
a regular user, you’d set the maximum age to something like 45 days. When the password 
expires, the user is informed that the password must be changed and the user does so. 
However, a service can’t respond to such a message and instead is just locked out.
Because a service account has a high level of privileges, it is configured with a strong, 
complex password that is changed more often than regular users. Administrators need 
to manually change these passwords. The longer a password remains the same, the more 
likely it will be compromised. Another option is to configure the account to be non-
interactive, which prevents a user from logging onto the account using traditional logon 
methods.
Services can be configured to use certificate-based authentication. Certificates are issued 
to the device running the service and presented by the service when accessing resources. 
web-based services often use application programming interface (API) methods to exchange 
information between systems. These API methods are different depending on the web-
based service. As an example, Google and Facebook provide web-based services that web 
developers use, but their implementations are different.


602
Chapter 13 

Managing Identity and Authentication
Implementing Identity Management
Identity management techniques generally fall into one of two categories: centralized and 
decentralized/distributed.

Centralized access control
implies that all authorization verification is performed by a 
single entity within a system.

Decentralized access control
(also known as 
distributed access control
) implies that 
various entities located throughout a system perform authorization verification.
Centralized and decentralized access control methodologies offer the same benefits 
and drawbacks found in any centralized or decentralized system. A small team or indi-
vidual can manage centralized access control. Administrative overhead is lower because all 
changes are made in a single location and a single change affects the entire system.
Decentralized access control often requires several teams or multiple individuals. 
Administrative overhead is higher because changes must be implemented across numerous 
locations. Maintaining consistency across a system becomes more difficult as the number of 
access control points increases. Changes made to any individual access control point need 
to be repeated at every access point.

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   560   561   562   563   564   565   566   567   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish