In this video, you will learn about the different cloud considerations to consider in IdAM. These considerations include items under the following categories: physical logical personnel connectivity trust Reflect and …
In this video, you will learn about the implementation solution used in case study 3. Reflect and share: Now that you have learned the solution architecture, how might you answer …
In this video, you will learn about secure socket layer (SSL), which is the protocol for encrypting web traffic. Reflect and share: Using an SSL has been shown to be …
In this video, you will learn about the Open Systems Connect (OSI) model and its layers of authentication. The layers that will be covered are: Physical Datalink Network Transport Session …
In this video, you will learn about PKI components, signatures, and encryption. The following components will be covered: the Certificate Authority (CA) Registration Authority (RA) directory/database certificate management system certificate …
In this video, you will learn about active directories and important concepts relating to them, such as: objects forests trees domains organizational units
In this video, you will learn about directory services, which can be thought of as a database. The most frequent use of directory services is to manage user objects and …
In this video, you will learn about how Kerberos works. Kerberos has two main server roles, the authentication server and the ticket granting server. Investigate and share: What are some …
In this video, you will learn how to protect yourself against rainbow tables using a technique called ‘salting’. Once you have watched the video, recap the following salting process: a …
In this video, you will learn about one of the first ways IdAM practitioners operated the client server architecture, about its vulnerabilities, and how it was addressed. What was the …
In this video, you will learn about smart cards and RFID cards. Specifically, you will learn about their advantages and disadvantages. Remember, a smart card will use an integrated circuit …
In this video, you will learn the solution architecture implemented for case study 4 and some of the challenges that manifested. Once you have watched the video, recap the challenges …
In this video, you will learn about some of the important trends around passwords in the IdAM context. These include the following: fewer passwords using derived credentials biometric authentication Reflect …
In this video, you will learn about eXtensible Access Control Mark-up Language (XACML), which will be compared with SAML and OAuth. Reflect and share: Now that you have learned about …
In this video, you will be introduced to the last case study, which is on the B2E model, web services, and SSO. Once you have watched the video, recap the …