Unit-4
Unit-4
Management (IAM) -
2
Outline
• Access Management:
• 4.1.1. Authentication,
• 4.1.1.1. Types of Authentication Factors (something you know, have, are),
• 4.1.1.2. Single Sign-On (SSO), Multi-factor authentication (MFA)
• 4.1.1.3. Password less Authentication,
• 4.1.2. Authorization:
• 4.1.2.1. Attribute-based access control (ABAC),
• 4.1.2.2. Rule-based access control (RBAC),
• 4.1.2.3. Policy-based access control (PBAC).
Access Control:
Access control is the method by which systems determine whether and how to
admit a user into a trusted area of the organization that is information systems, restricted
areas such as computer rooms, and the entire physical location.
Authorization is the process of determining what actions a user or system can perform
within a system after they have been authenticated.
It ensures that users have the right permissions to access resources, perform actions, or
modify data.
Attributes:
• User Attributes: Characteristics of the user, such as job title, department, or security
clearance.
• Resource Attributes: Properties of the resource being accessed, like sensitivity level or
ownership.
• Environment Attributes: Contextual information, such as time of access or location.
ABAC is used in complex environments such as,
• cloud services
• healthcare
• finance
Compliance: Useful in regulated industries where access to data must comply with specific
guidelines.
Policy-based access control (PBAC),
Policies: A collection of rules that define who can access what resources and under which
conditions.
Policy Engine: A system that evaluates incoming access requests against the defined
policies and makes decisions on whether to grant or deny access.