Skip main navigation

Cloud Considerations

In this video, you will learn about the different cloud considerations to consider in IdAM. These considerations include items under the following categories: physical logical personnel connectivity trust Reflect and …

Case Study 3: The Solution Architecture

In this video, you will learn about the implementation solution used in case study 3. Reflect and share: Now that you have learned the solution architecture, how might you answer …

Secure Socket Layer (SSL)

In this video, you will learn about secure socket layer (SSL), which is the protocol for encrypting web traffic. Reflect and share: Using an SSL has been shown to be …

Open Systems Connect Model and Authentication

In this video, you will learn about the Open Systems Connect (OSI) model and its layers of authentication. The layers that will be covered are: Physical Datalink Network Transport Session …

Public Key Infrastructure (PKI) (Continued)

In this video, you will learn about PKI components, signatures, and encryption. The following components will be covered: the Certificate Authority (CA) Registration Authority (RA) directory/database certificate management system certificate …

What is an Active Directory?

In this video, you will learn about active directories and important concepts relating to them, such as: objects forests trees domains organizational units

What is a Directory Service?

In this video, you will learn about directory services, which can be thought of as a database. The most frequent use of directory services is to manage user objects and …

Using Kerberos

In this video, you will learn about how Kerberos works. Kerberos has two main server roles, the authentication server and the ticket granting server. Investigate and share: What are some …

How to Protect Yourself Against Rainbow Tables

In this video, you will learn how to protect yourself against rainbow tables using a technique called ‘salting’. Once you have watched the video, recap the following salting process: a …

Hashing and Rainbow Tables

In this video, you will learn about one of the first ways IdAM practitioners operated the client server architecture, about its vulnerabilities, and how it was addressed. What was the …

The Use of Smart Cards and RFID

In this video, you will learn about smart cards and RFID cards. Specifically, you will learn about their advantages and disadvantages. Remember, a smart card will use an integrated circuit …

Case Study 4: The Solution Architecture

In this video, you will learn the solution architecture implemented for case study 4 and some of the challenges that manifested. Once you have watched the video, recap the challenges …

Password Trends

In this video, you will learn about some of the important trends around passwords in the IdAM context. These include the following: fewer passwords using derived credentials biometric authentication Reflect …

A Comparison of Technologies (Continued)

In this video, you will learn about eXtensible Access Control Mark-up Language (XACML), which will be compared with SAML and OAuth. Reflect and share: Now that you have learned about …

Case Study 4: Web Services and SSO

In this video, you will be introduced to the last case study, which is on the B2E model, web services, and SSO. Once you have watched the video, recap the …