What is authentication authorization and accounting AAA pronounced Triple A )? Quizlet?

  1. Science
  2. Computer Science

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

CompTIA security + 4.2 Identity and Access Services

Terms in this set (14)

RADIUS

(Remote Authentication Dial-In User Service) Remote Authentication Dial-In User Service (RADIUS) is a networking protocol, operating on ports 1812 and 1813, that provides centralized Authentication, Authorization, and Accounting (AAA or Triple-A) management for users who connect and use a network service. Think of when the hashes are compared.

AAA Authentication *

A series of software or hardware that performs authentication using the NAC (802.1X) protocol, Examples are RADIUS, TACACS, etc.

TACACS

A technology that was used with the ARPANET to establish authentication, a type of AAA server. Has many types including XTACACS AND TACACS that are improvements to the old tech.

LDAP, x.500

Lightweight Directory Access Protocol can be used as a AAA server and provide useful information. another name is x.500

Microsoft NTLM

Another AAA server but is mainly used Microsoft.

Kerberos

a type of AAA server, used on windows machines where one you authenticate once you are trusted by the system. Not everything is Kerberos friendly, some things just don't support it.

PPP Authentication *

similar to AAA server, but is used the Authenticate on a Non-Ethernet network, software like PAP, CHAP, and MS-CHAP

PAP

A PPP authentication method that provides no encryption when authenticating because back in the day there was no way to listen in on a dial-up, very rare to be used, sometimes used on older systems

CHAP

(Challenge Handshake Authentication Protocol) a PPP authentication method, after establishing a three-way handshake CHAP will send a challenge question, the client responds with a password hash calculated from the challenge and the password. This is to make sure we are still communicating with the same machine.

MS-CHAP

a Microsoft version of CHAP, had many vulnerabilities and made it unusable.

Server-based authentication *

Webservers are stateless and need a way to make sure its still communicating with the client, this type of authentication has the server keeps track of the user, examples include Cookies, SessionID, etc. This is stored on the server

Token-based authentication *

With token authentication a token is given to the client and is stored locally, this allows the server to not need to store information to keep track of who is who.

SAML

Security Assertions Markup Language. An XML-based standard used to exchange authentication, PC exclusive, it wasn't designed to support mobile.

OAuth

Not a authentication process used to determine permissions of a user, created by big tech

Students also viewed

Lab 8 Assessment Quiz

40 terms

mbarrow4Plus

MIS Exam 2 Chapter 5

68 terms

savannah_lough

Map & Hash (Preparation Quiz)

5 terms

Tinna_Rut

Midterm 2 Ch's 5 and 7

30 terms

Coral_Quinn2

Other sets by this creator

English

14 terms

Davidp2159

English

14 terms

Davidp2159

Order of Volatility

7 terms

Davidp2159

CompTIA security+ Pre test

163 terms

Davidp2159

Verified questions

chemistry

Identify the following as elements or compounds: $$ \mathrm{NH}_3, \mathrm{~N}_2, \mathrm{~S}_8, \mathrm{NO}, \mathrm{CO}, \mathrm{CO}_2, \mathrm{H}_2, \mathrm{SO}_2 \text {. } $$

Verified answer

biology

Describe three kinds of reproductive isolating mechanisms that prevent interbreeding between different species.

Verified answer

engineering

Find symmetric equations for the line through $(4,-11,-7)$ that is parallel to the line $x=2+5 t, y=-1+\frac{1}{3} t, z=9-2 t$.

Verified answer

physics

What, if anything, happens to the volume of gas in an atmospheric research-type balloon when it is heated ?

Verified answer

Recommended textbook solutions

Fundamentals of Database Systems

7th EditionRamez Elmasri, Shamkant B. Navathe

687 solutions

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

Starting Out with Python

4th EditionTony Gaddis

629 solutions

Other Quizlet sets

Psych 381 Final

65 terms

molly_brys

econ final

70 terms

Kass223Plus

neuroscience exam 2 answers

28 terms

tyler_vidal

7th Science Chapter 12

13 terms

z2016marble

What is authentication authorization and accounting AAA pronounced Triple A?

AAA stands for authentication, authorization, and accounting. AAA is a framework for intelligently controlling access to computer resources, enforcing policies, auditing usage, and providing the information necessary to bill for services.

What is authentication authorization and accounting quizlet?

Authentication, authorization, and accounting (AAA) is a standards-based framework that can be implemented to control who is permitted to access a network (authenticate), what they can do on that network (authorize), and to audit what they did while accessing. the network (accounting).

What is AAA quizlet?

The Agricultural Adjustment Act (AAA) was a United States federal law of the New Deal era which reduced agricultural production by paying farmers subsidies not to plant on part of their land and to kill off excess livestock. Its purpose was to reduce crop surplus and therefore effectively raise the value of crops.

What is the description of authentication in AAA?

The process of authentication is based on each user having a unique set of criteria for gaining access. The AAA server compares a user's authentication credentials with other user credentials stored in a database. If the credentials match, the user is granted access to the network.

Toplist

Neuester Beitrag

Stichworte