CompTIA Security+ (SY0-601): Authentication
This set of flashcards explores time- and event-based authentication mechanisms like TOTP and HOTP, along with advanced identity solutions such as context-aware authentication and Federated Identity Management (FidM), including both cross-certification and trusted third-party models for secure identity sharing.
TOTP
Time-Based One-Time Password:
A password is computed from a shared secret and current time
Key Terms
TOTP
Time-Based One-Time Password:
A password is computed from a shared secret and current time<...
HOTP
HMAC-based One-Time Password:
A password is computed from a shared secret and is synchroniz...
Context-Aware Authentication
Process to check the user’s or system’s attributed or characteristics prior to allowing it to connect
Restrict authe...
FidM
Federated Identity Management:
A single identity is created for a user and shared with all ...
FidM: Cross-Certification
Utilizes a web of trust between organizations where each one certifies others in the federation
FidM: Trusted Third-Party
Organizations are able to place their trust in a single third-party (also called the bridge model)
Trusted third-par...
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
Term | Definition |
---|---|
TOTP | Time-Based One-Time Password: A password is computed from a shared secret and current time |
HOTP | HMAC-based One-Time Password: A password is computed from a shared secret and is synchronized between the client and the server |
Context-Aware Authentication | Process to check the user’s or system’s attributed or characteristics prior to allowing it to connect Restrict authentication based on the time of day or location |
FidM | Federated Identity Management: A single identity is created for a user and shared with all of the organizations in a federation |
FidM: Cross-Certification | Utilizes a web of trust between organizations where each one certifies others in the federation |
FidM: Trusted Third-Party | Organizations are able to place their trust in a single third-party (also called the bridge model) Trusted third-party model is more efficient than a cross certification or web of trust mode |
FidM: SAML | Security Assertion Markup Language: Open standard for authentication & authorization |
FidM: OpenID | An open standard and decentralized protocol that is used to authenticate users in a federated identity management system Used in conjunction with OAuth2 User logs into an Identity Provider (IdP) and uses their account at Relying Parties (RP) OpenID is easier to implement than SAML |
802.1x | Standardized framework used for port-based authentication on wired and wireless networks Helps prevent rogue devices (Ex: RADIUS, TACACS+) |
EAP | Extensible Authentication Protocol: EAP-MD5 uses simple passwords for its challenge-authentication EAP-TLS uses digital certificates for mutual authentication EAP-TTLS uses a server-side digital certificate and a client-side password for mutual authentication |
EAP-FAST | Provides flexible authentication via secure tunneling (FAST) by using a protected access credential instead of a certificate for mutual authentication |
PEAP & LEAP | Protected EAP: Lightweight EAP: |
LDAP | Lightweight Directory Access Protocol: Unencrypted: Port 389 Active Directory is Microsoft’s version |
Kerberos | An authentication protocol used by Windows to provide for two-way (mutual) authentication using a system of tickets Port 88 A domain controller can be a single point of failure for Kerberos |
PAP | Password Authentication Protocol: |
CHAP | Challenge-Handshake Authentication Protocol: 3-way handshake |
VPN Concentrator | Specialized hardware device that allows for hundreds of simultaneous VPN connections for remote workers |
Split Tunneling | A remote worker’s machine diverts internal traffic over the VPN but external traffic over their own internet connection Prevent split tunneling through proper configuration and network segmentation |
RADIUS | Centralization administration system for dial-up, VPN, and wireless authentication that uses either ports 1812/1813 (UDP) or 1645/1646 (UDP) Operates at layer 7 |
TACACS+ | Cisco’s proprietary version of RADIUS that provides separate authentication and authorization functions over port 49 (TCP) |
MitB | Man-in-the-Browser Attack: Intercepts API calls between the browser process and its DLLs |
Password Spraying | Brute force attack in which multiple user accounts are tested with a dictionary of common passwords |
Credential Stuffing | Brute force attack in which stolen user account names and passwords are tested against multiple websites Credential stuffing can be prevented by not reusing passwords across different websites |
Broken Authentication | A software vulnerability where the authentication mechanism allows an attacker to gain entry Weak password credentials |
OAuth | Authorization framework |