Identity & Access Management

136 terms

AllAPI SecurityAccess ControlAccountsAuthenticationComplianceCore ConceptsCryptographyDevice SecurityDirectory ServicesFederationGovernanceHardwarePAMPKIPrinciplesProtocolsStandardsThreatsTokensWeb Security

Access Control(7)

Accounts(2)

API Security(4)

Authentication(19)

2FA (Two-Factor Authentication)

A specific form of MFA using exactly two authentication factors. Common combinations include password + OTP, or password + biometric verification.

Adaptive Authentication

Authentication that adjusts requirements based on risk assessment. Low-risk scenarios use simpler methods; high-risk triggers additional verification steps.

Biometric Authentication

Authentication using unique biological characteristics like fingerprints, facial features, iris patterns, or voice. Provides strong identity verification but raises privacy considerations.

Challenge-Response Authentication

Authentication where the server sends a random challenge and the client proves identity by responding correctly, typically with a cryptographic signature.

HOTP (HMAC-based One-Time Password)

OTP algorithm generating codes based on a counter and shared secret. Each code is valid until used. Predecessor to TOTP, still used in some hardware tokens.

Magic Link

Passwordless authentication method sending a single-use login link via email. Clicking the link authenticates the user. Simple but depends on email security.

MFA (Multi-Factor Authentication)

Authentication requiring two or more verification factors from different categories: something you know (password), something you have (token), or something you are (biometric).

OTP (One-Time Password)

A password valid for only one login session or transaction. Can be time-based (TOTP) or counter-based (HOTP). Common second factor in MFA implementations.

Passkey

FIDO2 credential that replaces passwords, synced across devices via cloud platforms. Combines security of public key cryptography with convenience of password managers.

Passwordless Authentication

Authentication methods that don't require passwords, using alternatives like biometrics, hardware keys, or magic links. Eliminates password-related security risks.

Phishing-Resistant Authentication

Authentication methods that cannot be phished, such as FIDO2 security keys. Uses cryptographic binding to origins, preventing credential theft via fake sites.

Push Authentication

MFA method sending authentication requests to a mobile app. User approves or denies access with a tap. More user-friendly than entering OTP codes.

Resident Key / Discoverable Credential

FIDO2 credential stored on the authenticator, enabling passwordless authentication. User selects credential from device rather than entering username.

Risk-Based Authentication

Authentication using real-time risk scoring from factors like location, device, behavior, and threat intelligence to determine authentication requirements.

SSO (Single Sign-On)

Authentication scheme allowing users to access multiple applications with one set of credentials. Improves user experience while centralizing authentication control.

Step-Up Authentication

Requiring additional authentication factors when accessing sensitive resources or performing high-risk actions within an authenticated session.

TOTP (Time-based One-Time Password)

OTP algorithm generating codes based on current time and a shared secret. Codes typically valid for 30 seconds. Used by apps like Google Authenticator and Authy.

User Presence

Confirmation that a human physically interacted with an authenticator, typically by touching a button. Weaker than user verification but prevents remote attacks.

User Verification

Local verification on an authenticator proving the authorized user is present. Methods include PIN, fingerprint, or face recognition on the device.

Compliance(4)

GDPR (General Data Protection Regulation)

A comprehensive data protection and privacy regulation enacted by the European Union in 2018. It governs how organizations collect, process, store, and transfer personal data of EU residents. Key requirements include obtaining explicit consent, data minimization, the right to access, the right to erasure ('right to be forgotten'), data portability, and mandatory breach notification within 72 hours.

HIPAA (Health Insurance Portability and Accountability Act)

A United States federal law enacted in 1996 that establishes national standards for protecting sensitive patient health information (PHI - Protected Health Information). HIPAA requires covered entities and business associates to implement administrative, physical, and technical safeguards including access controls, audit trails, encryption, and authentication mechanisms to ensure the confidentiality, integrity, and availability of electronic PHI.

PCI DSS (Payment Card Industry Data Security Standard)

A set of security standards established by the PCI Security Standards Council (founded by Visa, Mastercard, American Express, Discover, and JCB) to protect cardholder data. Requirements include implementing multi-factor authentication for administrative access, maintaining strong access control measures, encrypting transmission of cardholder data across open networks, and regularly testing security systems. Compliance is mandatory for any organization that processes, stores, or transmits payment card data.

SOC 2 (System and Organization Controls 2)

An auditing framework developed by the AICPA (American Institute of Certified Public Accountants) that evaluates a service organization's controls across five Trust Services Criteria: security, availability, processing integrity, confidentiality, and privacy. SOC 2 reports are commonly required by enterprise customers to verify that vendors properly protect customer data.

Core Concepts(6)

Cryptography(10)

AES (Advanced Encryption Standard)

Symmetric encryption algorithm adopted as the standard by NIST. Available in 128, 192, and 256-bit key lengths. Used for data encryption at rest and in transit.

Asymmetric Cryptography

Cryptography using different keys for encryption and decryption. Also called public key cryptography. Enables secure key exchange and digital signatures.

Cryptographic Hash

One-way function producing fixed-size output from arbitrary input. Used for password storage, integrity verification, and digital signatures.

Digital Signature

Cryptographic mechanism proving authenticity and integrity of data. Created with private key, verified with public key. Non-repudiable proof of origin.

ECC (Elliptic Curve Cryptography)

Asymmetric cryptography using elliptic curves. Provides equivalent security to RSA with smaller key sizes. Used in FIDO2, TLS, and modern cryptographic systems.

Key Derivation Function (KDF)

Algorithm deriving cryptographic keys from passwords or other secrets. Adds computational cost to resist brute force. Examples include PBKDF2, bcrypt, and Argon2.

Public Key Cryptography

Cryptography using mathematically related key pairs. Public key encrypts/verifies; private key decrypts/signs. Foundation of FIDO, TLS, and digital signatures.

RSA

Asymmetric encryption algorithm based on factoring large primes. Used for key exchange, digital signatures, and encryption. Being replaced by elliptic curve cryptography.

Salt

Random data added to passwords before hashing. Prevents rainbow table attacks and ensures identical passwords produce different hashes.

Symmetric Cryptography

Cryptography using the same key for encryption and decryption. Faster than asymmetric but requires secure key exchange. Used for bulk data encryption.

Device Security(4)

Directory Services(2)

Federation(6)

Governance(8)

Hardware(7)

PAM(7)

PKI(5)

Principles(6)

Protocols(9)

DPoP (Demonstrating Proof of Possession)

OAuth extension binding access tokens to specific client key pairs. Prevents token theft and replay attacks by proving possession of a private key.

Kerberos

Network authentication protocol using tickets to prove identity. Uses symmetric key cryptography and a trusted third party. Core of Windows Active Directory authentication.

LDAP (Lightweight Directory Access Protocol)

Protocol for accessing and managing directory services containing user information. Foundation of Active Directory and other enterprise identity stores.

OAuth 2.0

Authorization framework enabling applications to obtain limited access to user accounts. Delegates authentication to the identity provider without sharing credentials.

OpenID Connect (OIDC)

Identity layer built on OAuth 2.0 for authentication. Provides standardized user identity information via ID tokens. Foundation for modern web authentication.

PKCE (Proof Key for Code Exchange)

OAuth 2.0 extension preventing authorization code interception attacks. Required for public clients like mobile apps and SPAs that can't securely store secrets.

RADIUS

Remote Authentication Dial-In User Service. Network protocol for centralized authentication, authorization, and accounting. Commonly used for network access control.

SAML (Security Assertion Markup Language)

XML-based standard for exchanging authentication and authorization data between identity providers and service providers. Common in enterprise SSO implementations.

SCIM (System for Cross-domain Identity Management)

Standard for automating user identity provisioning and deprovisioning across systems. Enables consistent user lifecycle management across cloud applications.

Standards(12)

AAL (Authenticator Assurance Level)

NIST-defined levels of authentication strength. AAL1 allows passwords; AAL2 requires MFA; AAL3 requires hardware-based verifier-impersonation-resistant authenticators.

CAC (Common Access Card)

Smart card used by US Department of Defense for identity, authentication, and digital signatures. Implements PIV standards for military and civilian personnel.

CTAP (Client to Authenticator Protocol)

Protocol enabling communication between authenticators (like security keys) and client devices. CTAP2 is part of FIDO2, supporting passwordless and MFA use cases.

FAL (Federation Assurance Level)

NIST-defined levels for federated identity transactions. Specifies requirements for assertion protection, presentation, and trust between parties.

FIDO (Fast Identity Online)

Open authentication standards developed by the FIDO Alliance enabling passwordless, phishing-resistant authentication using public key cryptography and hardware authenticators.

FIDO2

The latest FIDO standard combining WebAuthn and CTAP protocols. Enables passwordless authentication in browsers and platforms using security keys or platform authenticators.

IAL (Identity Assurance Level)

NIST-defined levels of identity proofing rigor. IAL1 is self-asserted; IAL2 requires remote or in-person proofing; IAL3 requires in-person verification.

NIST SP 800-63

Digital Identity Guidelines from NIST defining identity assurance levels, authenticator requirements, and federation standards. Referenced by US federal systems and industry.

PIV (Personal Identity Verification)

US federal standard for smart card-based identity credentials. Defines card format, cryptographic requirements, and authentication protocols for government IDs.

SPIFFE

Secure Production Identity Framework for Everyone. Standard for workload identity enabling mutual authentication between services without shared secrets.

U2F (Universal 2nd Factor)

FIDO standard for hardware-based second factor authentication. Predecessor to FIDO2. Uses USB or NFC security keys for phishing-resistant MFA.

WebAuthn (Web Authentication)

W3C standard for passwordless authentication in web browsers. Uses public key cryptography with hardware authenticators or platform biometrics to replace passwords.

Threats(8)

Tokens(5)

Web Security(5)