diff --git a/Access Control/PAM-image1.jpg b/Access Control/PAM-image1.jpg new file mode 100644 index 0000000..fa6469f Binary files /dev/null and b/Access Control/PAM-image1.jpg differ diff --git a/Access Control/PAM-image2.png b/Access Control/PAM-image2.png new file mode 100644 index 0000000..b935ae7 Binary files /dev/null and b/Access Control/PAM-image2.png differ diff --git a/Access Control/PAM-image3.png b/Access Control/PAM-image3.png new file mode 100644 index 0000000..4c884c3 Binary files /dev/null and b/Access Control/PAM-image3.png differ diff --git a/Access Control/PAM-image4.png b/Access Control/PAM-image4.png new file mode 100644 index 0000000..903bac3 Binary files /dev/null and b/Access Control/PAM-image4.png differ diff --git a/Access Control/PAM-image5.png b/Access Control/PAM-image5.png new file mode 100644 index 0000000..59e9de1 Binary files /dev/null and b/Access Control/PAM-image5.png differ diff --git a/Access Control/PAM-image6.png b/Access Control/PAM-image6.png new file mode 100644 index 0000000..c700f08 Binary files /dev/null and b/Access Control/PAM-image6.png differ diff --git a/Access Control/intro-to-PAM.html b/Access Control/intro-to-PAM.html new file mode 100644 index 0000000..3161f63 --- /dev/null +++ b/Access Control/intro-to-PAM.html @@ -0,0 +1,1208 @@ + + + + + + + + 762b28a6-aa4c-4afb-87f7-d44548b04d03 + + + +

+ Introduction to Privileged Access Management +

+

+ © 2024 IDPro, André Koot (SonicBee) +

+

+ + To comment on this article, please visit our + + + GitHub repository + + + and + + + submit an issue + + + . + +

+

+ Introduction to Privileged Access +

+

+ Privileged Access Management (PAM) plays a crucial role in modern cybersecurity. All organizations (at least those with technical infrastructure) maintain accounts with some form of super-user permissions, e.g., the Administrator account on a laptop. Organizations enhance their security posture and protect valuable assets from inside and outside threats by addressing the issues and risks associated with privileged accounts. This requires a combination of robust policies, technologies, and best practices that help organizations manage the risks while ensuring the confidentiality, integrity, and availability (the “CIA Triad”) of systems and data. +

+

+ Terminology +

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
+ Access + + The permissions, privileges, and abilities granted to users, account types, system processes, applications, or any other entities within a computing environment. +
+ Privileged Access + + Users or accounts with high-risk permissions, such as those that grant them access to (critical) systems, sensitive data, and configuration settings +
+ Privileged Access Management + + A mechanism for managing temporary access for accounts with high-risk permissions. PAM often involves check-out and check-in of a credential generated for a single use. + + + 1 + + +
+ Privileged Account Management + + Focuses on special control for risky high-level access. Privileged Account Management (PAM) is a mechanism for getting those special accounts under control. + + + 2 + + +
+ Role Based Access Control (RBAC) + + The use of roles at runtime: a way to govern who gets access to what through the use of business roles and application roles +
+ Joiner/Mover/Leaver + + The joiner/mover/leaver lifecycle of an employee identity considers three stages in the life cycle: joining the organization, moving within the organization, and leaving the organization. +
+ Least Privilege + + The principle that a security architecture should be designed so that each entity is granted the minimum system resources and authorizations that the entity needs to perform its function. + + + 3 + + +
+ Identity Governance and Administration + + A discipline that focuses on identity life cycle management and access control from an administrative perspective. + + + 4 + + +
+

+ Acronyms in Use +

+ + + + + + + + + + + + + + + + + + + + + +
+ CIA: Confidentiality, Integrity, and Availability + + The “triad” that forms the basis of information security. +
+ RPA: Robotic Process Automation + + Autonomous IT solution to automate manual tasks. This autonomy is in contrast to a user-initiated macro. +
+ ICS: Industrial Control Systems + + Implemented to separate IT environments from Operational Technology environments (e.g., in industrial process industries) +
+ SCADA: Supervisory Control and Data Acquisition + + An architecture framework to secure ICS environments +
+

+ Privileged Accounts +

+

+ Privileged accounts, often called ‘super-user’ or ‘administrator’ accounts, possess elevated permissions granting access to (critical) systems, sensitive data, and configuration settings. With this level of access, these accounts define the behavior of the component they belong to. ‘Administrator’ is the built-in account needed to configure a Windows component, such as the directory, the filesystem, and the networking capabilities. Similarly, ‘root’ is the super-user account on UNIX and Linux systems and many infrastructure components. In database management systems, there are ‘SA’ (system admin), ‘DBO/DBA’ (database owner/admin), ‘root,’ or ‘postgres.’ These accounts function on behalf of a component itself (rather than a user). Anyone who knows the password can log in and effectively + + + be + + + the component: they can change the component's behavior and thus make or break the system. These super accounts are almighty. +

+

+ Managing access to privileged accounts should be one of the most common early initiatives in an organization’s identity & access management (IAM) journey. Why? The simple answer is that the organization should manage access where risk is highest. For more detail, look no further than the #1 item in the 2021 OWASP top 10 list of Web Application Security Risks: Broken Access Control ( + + + OWASP link + + + ). + + + 5 + + + Without effective privileged access management (PAM), all three legs of the information security CIA triad can be compromised, sometimes with catastrophic results. This is why, although they vary by country, emerging regulatory frameworks specifically call for controls on privileged access. For example, here is one clause in which the European NIS2 Directive specifically refers to PAM as an essential part of ‘cyber hygiene:’ +

+
+

+ + …Cyber hygiene policies comprising a common baseline set of practices, including software and hardware updates, password changes, the management of new installs, the limitation of administrator-level access accounts, and the backing-up of data, enable a proactive framework of preparedness and overall safety and security in the event of incidents or cyber threats + + + + 6 + + +

+
+

+ Regulation is not the only reason to start a PAM program. Even if an organization isn’t subject to these compliance controls, managing access to privileged accounts is in its best interests. Figure 1 demonstrates what can happen when unauthorized users gain access to admin accounts. +

+

+ Screen shots of two twitter posts, nominally from Joe Biden and Barack Obama but posted as a result of hacked Twitter admin accounts. +

+

+ + Figure 1: In 2020, the admin accounts of Twitter Operations Management software were leaked to a Slack channel and accessed by an unauthorized person, leading to fraudulent activity. + + + + 7 + + +

+

+

+

+ Threats of Privileged Access +

+

+ As demonstrated by the example in Figure 1, organizations that do not constrain the proliferation of – and access to - privileged accounts face several issues. Those issues include: +

+ +

+ A Typology of Privileged Access Accounts +

+

+ Understanding the different types and characteristics of privileged accounts is essential to management and risk mitigation. +

+

+ Human Privileged Accounts +

+

+ Human-privileged accounts are governed by the human resource practices in an organization. The CEO, for example, often has more privileges in systems than interns. Because the CEO’s user accounts have more power – and because the CEO is often easily identifiable – their privileged accounts are at a greater risk of attack. Fortunately, executives seldom have root access to Linux servers and are rarely assigned as admins to Windows Server management. However, their access and associated risks should be managed thoughtfully. Role-Based and Policy-Based Access Control can help control the amount of access that such users have. +

+

+ Another type of access would be individual/nominative accounts – those with root access, global admin rights, or other highly privileged group membership. Managers should consider these accounts high-risk. The usage of these authorizations may not be anonymous, but they should never be assigned for an indefinite amount of time. Just-in-Time (JIT) provisioning or dynamic access controls offer further controls to prevent long-standing high-risk authorizations. +

+

+ Privileged access may also refer to operations involving sensitive data, e.g., the amount or type of personally identifiable information (PII) or company financial data that an individual user has access to. In some scenarios, privileged access may extend to + + which + + customers’ data. For instance, a healthcare organization treating a ‘VIP’ may consider their data more sensitive. While policy and regulation treat them as equal, the collateral damage in the event of a data breach may be more significant, and, therefore, an organization may put more access controls in place. +

+

+ The key risks applicable to human accounts are two-fold: +

+
    +
  1. +

    + Legitimate users (employees, contractors, etc.) gain more access than they should and, thus, put the organization at greater risk of insider threat or data loss. +

    +
  2. +
  3. +

    + Bad actors gain access to legitimate users’ accounts through one of many attack vectors, like password spray attacks, phishing campaigns, or consent hacking. +

    +
  4. +
+

+ Of course, these risks often work hand-in-hand since bad actors that gain access to the highly privileged accounts of legitimate users can inflict greater damage. +

+

+ Best practices for managing this type of account include: +

+ +

+ These controls depend on solid governance and access management processes. For more information on Workforce Identity and Access Management (also called Identity Governance and Administration, or IGA) solutions that support Joiner-Mover-Leaver workflows and Role Based Access Control, + + see An Overview of the Digital Identity Lifecycle. + + + + 8 + + + These solutions can, however, not manage + + non-human + + privileged accounts since the managing process is not a joiner-mover-leaver process. +

+

+ Non-Human Privileged Accounts +

+

+ Non-Human Accounts require different management processes and risk mitigation strategies because they are not human (as suggested by the name). These non-human accounts are not managed via a joiner-mover-leaver processes. Instead, events in their lifecycle result from a change management process. +

+

+ A diagram of a digital identity lifecycle for non-human accounts. The boxes include Create then Provision then Authenticate then Manage / Maintain then Deprovision Access. +

+

+ + Figure 2: Lifecycle of Non-Human Accounts + +

+

+ Figure 2 articulates the following lifecycle for non-human accounts: +

+
    +
  1. +

    + + Create: + + A non-human account is created as the result of a change request, either in a development process or brought in through a procurement process. It could be a server, a network component, or an RPA. +

    +
  2. +
  3. +

    + + Provision: + + The component is activated, gets an identity, and is given the least privileged authorizations required to perform the configured tasks. A secret is configured to make it possible to authenticate the component at runtime. +

    +
  4. +
  5. +

    + + Authenticate: + + Once activated, the account needs to be identified by a governing body (like the network) and authenticated, whether by a configured password, a certificate, or a token. +

    +
  6. +
  7. +

    + + Manage/Maintain: + + During the lifecycle, the component's functionality can change, which will always be managed through the change management process. +

    +
  8. +
  9. +

    + + Deprovision Access: + + When the component is decommissioned, access is removed to prevent abuse (practitioners often forget this step). +

    +
  10. +
+

+ There are two forms of non-human privileged accounts: those that humans interact with and those they do not. While the main focus of this article is + + interactive + + non-human accounts, it is crucial to consider the PAM implications of those that do not interact. +

+

+ Non-Human, Non-Interactive Privileged Accounts +

+

+ Some privileged accounts are non-interactive, meaning that humans generally do not log into them to perform business activities. These are the accounts of components like middleware services, such as databases or web servers. These services access resources after a login with a secret kept in a config file using tokens or secrets. These accounts act as placeholders in the system log that register resource usage. +

+

+ For example, in accounting software, an application may need to register transactions in a relational database. To do this registration, the application looks up the password of the configured service account and logs in to the database. This results in each transaction being logged against and owned by that application. The application must, of course, ensure that the account of every actor is registered as the initiator of their transactions. +

+

+ Other examples include accounts used for automation, such as batch accounts, macros, or RPAs. The organization’s Technology team documents a change request with the process requirements for each automated task and then creates the appropriate script or configuration to execute the steps. The process itself needs to have the requisite authorization to run. Or, in other words, achieve the minimal required authorizations according to the ‘least privilege’ principle. +

+

+ In these scenarios, the change requester or requirements owner should be considered the accountable party for the script, macro, or RPA. +

+

+ Best practices for managing this type of account include: +

+ +

+ To learn more about managing these types of privileged accounts, see + + Non-human Account Management + + in the BoK. + + + 9 + + +

+

+ Interactive Non-Human Privileged Accounts +

+

+ Interactive non-human accounts - the main focus for the remainder of this article - are also called system accounts: these are the built-in component accounts, such as ‘admin’ or ‘root.’ These can also be accounts that are built-in into applications, such as the super-user of an application. A person who needs to use the power of this account will log in to the component with this account name and the password provided by the developer or the vendor. In the session that results, the person + + is + + the component. +

+

+ The existence of these almighty accounts creates severe risks of unauthorized access by individuals capable of breaking or exploiting the component: they can be tremendously damaging to an organization’s security posture if practitioners do not contain and strictly control their usage. As stated, someone who logs in with the component account + + + is + + + the component. And that means that the component itself is the actor, performing all the tasks. Without additional measures, the actual human being may not be known or identifiable. +

+

+ This type of account should only be used in specific circumstances and for a particular purpose, like during an incident or to deliver a change. This practice is a fundamental security principle. A common control is to raise a ticket in a service management solution when access to this type of account is required. A PAM solution can then check that the ticket is valid. Connecting a PAM solution to the service management solution is best practice. +

+

+ Best practices for managing this type of account include: +

+ +

+ Addressing the Challenges of Privileged Accounts +

+

+ As established, there is a strong business driver to implement PAM. However, not every organization needs a costly solution. As long as an organization can cope with manual procedures for managing internal privileged accounts, that may be the best fit. A manual process might be something akin to the “envelope procedure,” in which the password to shared admin accounts is stored in a sealed envelope (yes, a physical envelope) that is kept inside a vault (yes, a physical vault). When an emergency arises, this envelope can be opened. This opening should be treated as a security incident resulting in password rotation and a new physical envelope. +

+

+ This type of process is appropriate when only a handful of people manage the system. Even where it may be effective, beware of risks: if one of these admins is absent or leaves the organization, there will be a lot of work to mitigate the risk of any shared accounts. +

+

+ Privileged Access Management Solutions +

+

+ Several conditions drive a need for automation and more formal solutions: +

+ +

+ Readers may also be interested in reading the Body of Knowledge article “ + + The Business Case for IAM + + .” + + + 10 + + +

+

+ With a need for automated PAM processes, organizations can implement a PAM solution. These solutions provide several means for managing Privileged Accounts. These can include different approaches to privilege management and secrets management, and they support a variety of operational use cases. +

+

+ Privilege Management +

+ +

+ Secret Management +

+

+ Secrets management aims to securely store, distribute, and control access to sensitive information, such as passwords, encryption keys, API tokens, and certificates. PAM solutions often offer: +

+ + + + + + + + + + + + + + + + + + + + + + + + + + +
+ + Secret Management for CI and CD + + + + Secret Management for APIs + +
+ + Environment Variables: + + CI/CD systems like Jenkins, Travis CI, or CircleCI allow developers to store sensitive information as environment variables. These secrets are encrypted and can be accessed during the pipeline execution, ensuring that they are never exposed directly in code or logs. + + + API Keys and Tokens: + + When accessing external APIs, developers often require API keys or tokens. Secrets management ensures that these keys are stored securely and are only accessible by authorized services or applications. It also enables the rotation of keys to mitigate security risks. +
+ + Secrets Vault: + + Many organizations use dedicated secrets management tools like HashiCorp Vault or AWS Secrets Manager. These tools centralize the storage of secrets, enforce access controls, and often provide features like secret rotation and auditing. CI/CD pipelines can authenticate and retrieve secrets from these vaults as needed. + + + OAuth and JWT: + + For more robust API access control, OAuth tokens and JSON Web Tokens (JWTs) are used. Secrets management ensures that the keys used to sign and verify these tokens are kept secure and rotated as necessary. +
+ + Temporary Credentials: + + For cloud-based services, CI/CD pipelines can request temporary access credentials from the cloud provider’s IAM (Identity and Access Management) services. This limits exposure and ensures that access credentials are short-lived. + + + Role-Based Access Control (RBAC): + + Secrets management can enforce RBAC for APIs, ensuring that only authorized users or applications have access to specific endpoints or resources. +
+ + + Logging and Monitoring: + + API access should be closely monitored, and logs should be audited to detect any suspicious or unauthorized access attempts. +
+

+ PAM Use Cases and Architectural Choices +

+ +

+ The following section explores a variety of architectures incorporating PAM. +

+

+
+

+

+ PAM as a Stepping Stone +

+

+ A diagram showing a PAM system at the center of an architecture that includes ITSM, Directory, SOC/SIEM, Recording, and Target System. +

+

+ Figure 4: PAM as a Stepping Stone Architecture +

+

+ Traditionally, PAM systems are installed in a data center, close to the components they manage. PAM systems can also be implemented as a SaaS solution (see the cloud discussion section at the end of this section). +

+

+ PAM in IT / OT environments +

+

+ In organizations employing Operational Technology (OT) components, the IT and OT domains are separated by default. This separation may be via airgap firewalls, Industrial Control Systems (ICS), or SCADA implementations. Some organizations add IT capabilities to OT to share control center capabilities and to provide remote access and monitoring. Traditionally, the separation is done through SCADA or ICS systems. A modern and more affordable solution is to use a ‘PAM-PAM’ connection that secures access. Only through an IT-PAM system does an operator get access to an OT-PAM system, where OT tasks can be performed: +

+

+ A diagram showing a PAM-to-PAM architecture in an IT/OT environment. It starts with a Directory and LDAP account, then goes through the IT PAM system to the Admin account, to the OT PAM system and finally the target system. +

+

+ Figure 5: PAM-PAM Architecture in an IT/OT Environment +

+

+

+

+ External Service Provider +

+

+ Many companies outsource parts of their operations management. The component owner is accountable for granting access if a third-party manages company resources. In this case, privileged access must also be assigned to third-party operators. In addition, when using external services, the company must ensure that the service provider uses a PAM solution. +

+

+ A PAM system in a third-party access model with the internal pam system being fed by the third party PAM system. +

+

+ Figure 6: PAM in 3rd-Party Access +

+

+ Remote access +

+

+ As described above, PAM solutions can offer business users and (external) developers remote access capability. This way, legacy remote access services and VPNs can be decommissioned, resulting in lower costs and reduced technical debt. +

+

+ A diagram for PAM in a remote access scenario where the PAM account touches a PAM web portal, which is the front half to the PAM System, then goes on to the target system. +

+

+ Figure 7: PAM for Remote Access +

+

+ Implementing PAM +

+

+ Good Implementation Practices +

+

+ Automated Discovery and Component Onboarding +

+

+ Components that need to be managed through a PAM system must be onboarded first, meaning that the privileged accounts and passwords must be brought into the PAM system. Onboarding components can be done manually, but PAM systems can automate the discovery of components in the network to start the actual onboarding. +

+

+ Session Control +

+

+ Authentication and logging controls happen by default when a session starts from a PAM system. Implementors can also add risk-based session controls, such as: +

+ +

+ Beware that recording and playing back sessions should be considered a privacy and security issue. Ensure workers (counsels/unions) agree and that playback calls for 4-eyes control. + + + 11 + + +

+

+ Break-the-Glass Procedures +

+

+ PAM systems act as authentication services. If the service is not available, the operator cannot get access to the component that needs to be managed. While redundancy is an essential control, break-the-glass procedures enable access to the password vault under emergency conditions. +

+

+ PAM in the Cloud +

+

+ Developments in PAM mirror the developments in most IT domains: where PAM systems used to be self-hosted, on-prem systems, nowadays, both SaaS and MSP options are becoming available, as well as hybrid solutions. +

+

+ Third-Party Contracts +

+

+ When outsourcing operations or using services provided by third parties, an organization must ensure that PAM requirements and rules apply to the third party. To protect the supply chain in this way, organizations should build this requirement into third-party contracts as well as procurement and vendor management processes. +

+

+ Addressing Barriers +

+

+ Adoption & Friction +

+

+ PAM System adoption depends heavily on user experience. PAM systems often add extra steps to log into the target systems, introducing a new pattern. Like the reason for access, ticket number, MFA, or lack of native integration with remote tools, these changes to established methods may lead to frustration among users. This friction also might lead users to seek backdoors that help them bypass PAM systems. +

+

+ Current admin account users may regret their loss of almighty powers – and may feel less empowered to manage their components. They may fear being mistrusted by management. It should be noted that these concerns are real: communication is essential in change management, and emphasis on the added functionality of PAM solutions, such as single sign-on and auditability of actions, can help. +

+

+ PAM System Availability +

+

+ PAM system availability is one of the biggest concerns for organizations. If the PAM system is unavailable, it prevents recovery since all the privileged accounts required to access IT assets are stored and managed by the PAM system. This risk can be countered by a flawless and tested break-glass procedure, which enables swift access recovery. Unfortunately, these break-glass accounts are often forgotten and can cause more harm than good, so it’s necessary to monitor, test, and securely store the break-glass credentials. +

+

+ Password Rotation of Hard-Coded Credentials +

+

+ Almost every service or application requires credentials to communicate with databases or other applications. These credentials are used to prove the application’s identity. Typically, they are privileged and embedded in various locations, such as configuration files, source code, INI files, OS services, and scheduled tasks, which are referred to as dependencies of the credentials. Therefore, when the password is rotated, the new password must also be updated in all dependencies. Many mature Privileged Access Management (PAM) systems can automatically update the new passwords in the dependencies after rotation. +

+

+ Conclusion +

+

+ Remember, PAM solutions do not address all risks relating to sensitive data access: practitioners must understand different privileged access scenarios and map them to the appropriate controls. First and foremost, they must consider the differences between human and non-human accounts. PAM solutions are not a panacea and do not address the thorny challenges of managing people or the non-interactive accounts that do not require humans once coded (these are demonstrably not people). Effective policy, governance, change management, and other controls are still very much required. +

+

+ PAM solutions are best used for interactively used non-human accounts, although their secret management tools often cater to the needs of non-interactively used non-human accounts. Make sure that these use cases are identified correctly before introducing any technology. +

+

+ Once an organization introduces PAM tools, do not underestimate the impact of culture: it can be a significant change for people. It is essential to bring people along, highlight the benefits of additional functionality, and communicate the necessity of an improved security posture for the organization. +

+

+ Remember these Core Principles +

+ +

+ Author Bio +

+

+ André Koot has over 25 years of experience in the field of IAM, and he is a principal consultant and co-founder of SonicBee, a Dutch IAM consultancy company (IDPro partner). André is focused on business consultancy and gives IAM training courses aligned with the BoK. He is also a member of the IDPro BoK committee and (co-)authored several articles in the BoK. +

+

+ Acknowledgments +

+

+ The author wishes to thank BoK editor Elizabeth Garber for reviewing and helping with this article. He also wishes to thank other contributors and reviewers: +

+

+ Contributors +

+ +

+ Reviewers +

+ +
+
+
    +
  1. +

    + Carter, M. K., (2022) “Techniques To Approach Least Privilege”, + + IDPro Body of Knowledge + + 1(9). doi: https://doi.org/10.55621/idpro.88 + + ↩ + +

    +
  2. +
  3. +

    + Bago (Editor), E. & Glazer, I., (2021) “Introduction to Identity - Part 1: Admin-time (v2)”, + + IDPro Body of Knowledge + + 1(5). doi: + + https://doi.org/10.55621/idpro.27 + + + ↩ + +

    +
  4. +
  5. +

    + Carter, M. K., (2022) “Techniques To Approach Least Privilege”, + + IDPro Body of Knowledge + + 1(9). doi: https://doi.org/10.55621/idpro.88 + + ↩ + +

    +
  6. +
  7. +

    + Bago (Editor), E. & Glazer, I., (2021) “Introduction to Identity - Part 1: Admin-time (v2)”, + + IDPro Body of Knowledge + + 1(5). doi: + + https://doi.org/10.55621/idpro.27 + + + ↩ + +

    +
  8. +
  9. +

    + OWASP (2021) “OWASP Top 10: 2021,” https://owasp.org/Top10/A01_2021-Broken_Access_Control/ + + ↩ + +

    +
  10. +
  11. +

    + European Parliament and the Council of the European (2022) “DIRECTIVE (EU) 2022/2555 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 14 December 2022 on measures for a high common level of cybersecurity across the Union, amending Regulation (EU) No 910/2014 and Directive (EU) 2018/1972,” clause 49, https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32022L2555 + + ↩ + +

    +
  12. +
  13. +

    + BBC (2020), “Major US Twitter accounts hacked in Bitcoin scam,“ https://www.bbc.com/news/technology-53425822 + + ↩ + +

    +
  14. +
  15. +

    + Cameron, A. & Grewe, O., (2022) “An Overview of the Digital Identity Lifecycle (v2)”, + + IDPro Body of Knowledge + + 1(7). doi: + + https://doi.org/10.55621/idpro.31 + + + ↩ + +

    +
  16. +
  17. +

    + Williamson, G., Koot, A. & Lee, G., (2022) “Non-human Account Management (v4)”, + + IDPro Body of Knowledge + + 1(11). doi: + + https://doi.org/10.55621/idpro.52 + + + ↩ + +

    +
  18. +
  19. +

    + Koot, A., (2023) “The Business Case for IAM”, + + IDPro Body of Knowledge + + 1(12). doi: + + https://doi.org/10.55621/idpro.97 + + + ↩ + +

    +
  20. +
  21. +

    + And as a side note: storage of recordings could lead to capacity issues. + + ↩ + +

    +
  22. +
+
+ + diff --git a/Introduction/image1.png b/Introduction/image1.png new file mode 100644 index 0000000..cdfac4d Binary files /dev/null and b/Introduction/image1.png differ diff --git a/Introduction/image2.jpg b/Introduction/image2.jpg new file mode 100644 index 0000000..a3eea84 Binary files /dev/null and b/Introduction/image2.jpg differ diff --git a/Introduction/image3.png b/Introduction/image3.png new file mode 100644 index 0000000..af0f9e8 Binary files /dev/null and b/Introduction/image3.png differ diff --git a/Introduction/image5.jpg b/Introduction/image5.jpg new file mode 100644 index 0000000..ec6dec3 Binary files /dev/null and b/Introduction/image5.jpg differ diff --git a/Introduction/intro-to-cryptography.html b/Introduction/intro-to-cryptography.html new file mode 100644 index 0000000..4fe4254 --- /dev/null +++ b/Introduction/intro-to-cryptography.html @@ -0,0 +1,714 @@ + + + + + + + + An Introduction to Cryptography + + + +
+

+ An Introduction to Cryptography +

+
+

+ By Mark Drummond (Empire Life) +

+

+ © 2024 IDPro, Mark Drummond +

+

+ + To comment on this article, please visit our + + + GitHub repository + + + and + + + submit an issue + + + . + +

+

+ Introduction +

+
+

+ Cryptography is the science and art of secret writing—keeping information secret. (Garfinkel 1996) +

+
+

+ For almost as long as we have been writing, we have tried to write in secret. The use of ciphers to make writing unintelligible to all but an intended recipient is at least as old as ancient Mesopotamia. +

+

+ In the year 1567, + + + Mary, Queen of Scots + + + , was executed for her involvement in a + + + plot + + + to assassinate the then Queen of England, Elizabeth I. A cabal of conspirators planned to overthrow Elizabeth to install Mary on the Throne of England. Mary’s hand in the affair was proven using letters between Mary and the cabal. These letters were written in cipher, rendered unintelligible to the casual observer. +

+

+ Queen Elizabeth’s spymaster, + + + Sir Francis Walsingham, + + + had been intercepting and making copies of Mary’s letters. He enlisted the help of + + + Thomas Phelippes + + + , a linguist and expert in ciphers, to decipher Mary’s letters. Phelippes was successful, and the content of the letters was revealed, making clear Mary’s involvement, thus giving Elizabeth the evidence she needed to have Mary put to death. +

+

+ In the 21st century, secret communications are as important as ever, but there are additional protections we want to apply to our messages. The study of techniques for protecting communications is referred to as Cryptography. +

+
+

+ Security practitioners use cryptographic systems to meet four fundamental goals: confidentiality, integrity, authentication, and non-repudiation. (Chapple 2021) +

+
+

+ Cryptography has four main goals: +

+ +

+ Terminology +

+

+ I will follow the model of Singh’s + + The Code Book + + (Singh 2000) in using more approachable but arguably less accurate or consistent terminology and definitions. Terms such as encrypt and encipher are treated as synonyms. Readers should bear in mind that the technical literature on cryptography may use slightly different definitions. +

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
+ + Term + + + + Synonyms + + + + Definition + +
+ Asymmetric Key Cryptography + + Public Key Cryptography + + A cryptosystem in which a pair of keys is used to encrypt and decrypt data. The pair of keys has the unusual property that data encrypted with one can be decrypted only with the other. +
+ Cipher + + Encryption Algorithm + + A method for transforming plaintext into ciphertext. +
+ Ciphertext + + — + + Data that has been encrypted. +
+ Cryptanalysis + + — + + The study of deciphering secret writing. Code breaking. +
+ Cryptography + + — + + The study of secret writing. Code making. +
+ Cryptology + + — + + The field of research encompassing both cryptography and cryptanalysis. +
+ Cryptosystem + + — + + The collection of technologies providing cryptographic functions such as encrypting and decrypting data. +
+ Decrypt + + Decipher + + To transform ciphertext into plaintext, rendering the data intelligible. +
+ Encrypt + + Encipher + + To transform plaintext into ciphertext, rendering the data unintelligible. +
+ Key + + Secret, secret key, encryption key + + Unique input to a cryptosystem that adds randomness to the encryption process. The security of a cryptosystem is predicated on the secrecy of the key. +
+ Session Key + + — + + A temporary key used to encrypt data communications during a relatively short-lived session. At the end of the session, further communication requires the use of a new session key. +
+ Plaintext + + Cleartext + + Data that has not been encrypted. +
+ Symmetric Key Cryptography + + Private Key Cryptography + + A cryptosystem in which a single key is used to both encrypt and decrypt data. +
+

+ Ciphers and Keys +

+
+

+ … the secrecy of messages must depend upon a changeable key added to a sound basic cipher—Gaines (Gaines 2014) + + + 1 + + +

+
+

+ All + + + modern cryptosystems + + + rely on a “key”, analogous to a password + + + 2 + + + . The key adds randomness to the encryption process, such that knowing the cipher alone is insufficient to decrypt the message. You can use new or additional keys as needed: a new key for every person you need to communicate with or a new key if you suspect an existing key has been compromised. Using a key-based system means your cipher can be made public, allowing experts to analyze it for flaws. It also means anyone can benefit from using your cipher to protect their data. +

+

+ Symmetric Key Cryptography +

+
+

+ Encryption is the process by which a message (called plaintext) is transformed into another message (called ciphertext) using a mathematical function and a special encryption password, called the key. (Garfinkel) +

+
+

+ Symmetric key cryptography uses a single key to encrypt and decrypt messages: +

+

+ MarcT0K (icons by JGraph), CC BY-SA 4.0 <https://creativecommons.org/licenses/by-sa/4.0>, via Wikimedia Commons +

+

+ Figure 1: Symmetric Key Cryptography +

+

+ MarcT0K (icons by JGraph), + + CC BY-SA 4.0 + + , via Wikimedia Commons +

+

+ Consider the following use case: +

+
    +
  1. +

    + Alice + + + 3 + + + wants to send a secret message to Bob. She chooses a strong key and a proven symmetric cipher, encrypts her message, and sends the ciphertext to Bob. +

    +
  2. +
  3. +

    + Eve may intercept the message, but she must perform cryptanalysis to reveal its contents. +

    +
  4. +
+

+ Symmetric cryptosystems are relatively simple and usually very fast for both encryption and decryption, but there is a significant challenge when using symmetric cryptography on a large scale: key distribution. Because Alice used a symmetric key algorithm to encrypt her message, she needs to also pass the key to Bob. She must not do this in a way that allows Eve to intercept the key, or all is lost. Alice and Bob could meet in person, but this becomes impractical if they are geographically remote from one another. +

+

+ Alice could hire a trusted courier, but this is slow and doesn’t scale. If there are N people who must communicate securely, and you never share a single key with more than two people, the number of secret keys needed is: +

+

+ +

+

+ Figure 2: For N = 1,000 people, you need to distribute, manage, and secure 499,500 keys +

+

+ Despite the key distribution problem, we use symmetric ciphers extensively. They are computationally efficient and, in an order of magnitude, more efficient than the asymmetric ciphers we discuss below. You can encrypt large amounts of data in comparatively little time. The symmetric cipher’s advantage is speed. +

+

+ Asymmetric Key Cryptography +

+

+ Asymmetric Key Cryptosystems take a radically different approach to encryption and decryption, which greatly simplifies the problem of key distribution. +

+

+ A Weak Analogy +

+

+ Imagine Alice and Bob have a lockbox with the following properties: +

+
    +
  1. +

    + The box has two distinct keys, one in Alice’s possession, the other in Bob’s possession, +

    +
  2. +
  3. +

    + When the box is locked with one of the keys, it can be unlocked only with the other, and vice versa. +

    +
  4. +
+

+ As long as Alice and Bob keep their keys secure, this box has some useful properties: +

+
    +
  1. +

    + Authentication: If Alice receives the box and it is locked, she knows it was Bob who locked the box, +

    +
  2. +
  3. +

    + Non-repudiation: Bob cannot deny having locked the box since it must have been locked with his key. +

    +
  4. +
+

+ In this way, Alice and Bob can securely and confidently exchange physical objects without having to share a single lockbox key. Because Alice and Bob have their own personal keys that are not shared, they can have many different boxes that use the same key, and the counterparties can securely exchange objects without needing to create additional keys to exchange with additional parties. +

+

+ New Directions in Cryptography +

+

+ In 1976, + + + Whitfield Diffie + + + and + + + Martin Helman + + + released a paper, “New Directions in Cryptography” (Diffie 1976), based in part on previous work by + + + Ralph Merkle + + + . In the paper, Diffie and Helman describe techniques for securely exchanging secret keys and a technique for encrypting data using a + + pair + + of encryption keys. In 1977, + + + Ron Rivest, Adi Shamir, and Leonard Adleman + + + would go on to develop the first commercially viable asymmetric cryptosystem, RSA, based on the work of Diffie & Helman. + + + 4 + + +

+

+ Asymmetric key cryptosystems are the foundation of cryptography on the Internet today. Every time you visit a secure HTTPS website, asymmetric key cryptography secures the connection. +

+

+ The pair of keys in an asymmetric key cryptosystem are mathematically bound in a way that provides some very useful features. Analogous to the lockbox keys above, a message encrypted with one of the keys in the pair can only be decrypted with the other key. One of the keys is made public. The other is kept secret. +

+

+ If Alice gives Bob her public key, Bob can use it to encrypt a message, and only the private key, kept secret by Alice, can decrypt the message. Likewise, if Bob has his own key pair and shares his public key with Alice, the two can now communicate securely without needing to pass a secret key back and forth. This solves the key distribution problem: For N people, you need only N key pairs. +

+

+ Davidgothberg, Public domain, via Wikimedia Commons +

+

+ Figure 3: Asymmetric Key Cryptography +

+

+ (Davidgothberg, Public domain, via Wikimedia Commons) +

+

+ Another useful operation made possible with asymmetric key cryptography is message signing. Alice can use her private key to apply a digital signature to a message, and that signature can be verified with her public key. If Alice signs a message and sends it to Bob, Bob can confirm that the message did, in fact, come from Alice. This confirmation, if successful, also tells Bob the message was not tampered with after it was signed. Consider the following workflow: +

+
    +
  1. +

    + Alice writes a message to Bob and signs it with her private key. +

    +
  2. +
  3. +

    + Alice encrypts the message with Bob’s public key and sends the message to Bob. +

    +
  4. +
  5. +

    + Bob decrypts the message with his private key. +

    +
  6. +
  7. +

    + Bob verifies the signature with Alice’s public key. +

    +
  8. +
+

+ As a result, Alice has communicated securely with Bob, and Bob knows he can trust the message. +

+

+ If this all seems too good to be true, fear not, there’s a downside! Public key encryption and signing are computationally much more expensive than symmetric key encryption, so much so that you would not want to regularly encrypt large amounts of data with asymmetric key encryption. +

+

+ The Best of Both Worlds +

+

+ Modern cryptosystems combine both asymmetric and symmetric key cryptography to leverage the benefits of each. Asymmetric key cryptography is used to securely share a secret key, which is then used for the duration of the current transaction or session. +

+

+ Conclusion +

+

+ Understanding cryptography is fundamental to understanding information security, and central to information security is digital identity. While it is not necessary for most identity practitioners to understand the mathematics behind specific cryptographic techniques, understanding how cryptography works in general and how we use it is essential. +

+

+ Acknowledgments +

+

+ The author thanks: +

+ +

+ Going Further +

+

+ There are many excellent resources for learning about cryptography and cryptanalysis. Some recommendations follow. See also the bibliography below. +

+

+ Non-Technical Resources +

+ +

+ Technical Resources +

+ +

+

+

+ Author Bio +

+

+ Mark Drummond +

+

+ +

+

+ Mark Drummond is Director of Digital Trust and Identity at The Empire Life Insurance Company in Kingston, Ontario, Canada. +

+

+ Bibliography +

+

+ Buchanan, Bill. “Asecuritysite.Com.” Security and So Many Things. Accessed January 31, 2024. https://asecuritysite.com/. +

+

+ Chapple, Mike, James Michael Stewart, and Darril Gibson. + + (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide. Ninth edition + + . Hoboken, NJ: John Wiley & Sons, Inc., 2021. +

+

+ Diffie, W., and M. Hellman. “New Directions in Cryptography.” + + IEEE Transactions on Information Theory + + 22, no. 6 (1976): 644–654. +

+

+ Gaines, Helen F. + + Cryptanalysis: A Study of Ciphers and Their Solution + + . Courier Corporation, 2014. +

+

+ Garfinkel, Simson, and Gene Spafford. + + Practical UNIX and Internet security + + . O’Reilly Media, Inc., 1996. +

+

+ Harris, Shon, and Fernando Maymí. + + CISSP All-in-One Exam Guide. Eighth edition + + . New York: McGraw-Hill, 2018. +

+

+ Kahn, David. + + The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet + + . Simon and Schuster, 1996. +

+

+ Kerckhoffs, Auguste. “La Cryptographie Militaire.” + + Journal des Sciences militaires + + , 9th series, IX (January 1883), 5-38 ; (February 1883), 161-191. +

+

+ Menezes, Alfred J., Paul C. Van Oorschot, and Scott A. Vanstone. + + Handbook of Applied Cryptography + + . CRC Press, 2018. +

+

+ Schneier, Bruce. + + Applied Cryptography : Protocols, Algorithms, and Source Code in C + + . 20th anniversary edition. Indianapolis, Indiana: Wiley, 2015. +

+

+ Singh, Simon. + + The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography + + . Anchor, 2000. +

+
+
+
    +
  1. +

    + A restatement of Kerckhoffs’ Principle, one of several principles for cryptographic systems in his “La Cryptographie Militaire” (Kerckhoffs 1883), which we can summarize as “even if Eve has your ciphertext and knows your cipher, the ciphertext should remain secure as long as the key has been kept secret”. + + ↩ + +

    +
  2. +
  3. +

    + Please note, this is not actually a password. It is not being used to authenticate someone. + + ↩ + +

    +
  4. +
  5. +

    + It is traditional to use the characters Alice, Bob, Eve, and others when describing cryptographic systems. Alice and Bob want to communicate in secret. Eve wants to eavesdrop on Alice and Bob’s conversation. + + ↩ + +

    +
  6. +
  7. +

    + In fact, Diffie, Helman, Merkle, Rivest, Shamir, and Adleman were scooped by James Ellis, Clifford Cocks, and Malcolm Williamson, all of GCHQ. Ellis proposed what was essentially public-key cryptography in 1970; based on Ellis’ work, Cocks independently developed RSA in 1973 and Williamson invented Diffie-Helman key exchange in 1974. Their work was kept secret until 1997. + + ↩ + +

    +
  8. +
+
+ + diff --git a/editor-note.md b/editor-note.md deleted file mode 100644 index 8c86b49..0000000 --- a/editor-note.md +++ /dev/null @@ -1,56 +0,0 @@ ---- -title: 'Editor''s Note' ---- - -Heather Flanagan, Principal Editor, IDPro - -It takes a village--or, in our case, a global industry of IAM -Practitioners--to create a new Body of Knowledge (BoK). This first -collection of articles is brought to you by individuals from around the -globe, including Europe, Australasia, and the Americas. Without their -engagement, we would not have been able to bootstrap this collection. - -This first issue of the IDPro Body of Knowledge offers an orientation -for the identity practitioner to some of the subject matter frequently -encountered in organizations.  We start this collection with an -Introduction to Identity -- Part 1: Admin-time, brought to us by Ian -Glazer and edited by Espen Bago. From there, we look at the world of -Identifiers and Usernames, another excellent article by Ian Glazer. -Three articles focus on how legal systems impact IAM: Laws Governing -Identity Systems by Thomas Smedinghoff, Introduction to the GDPR by -Andrew Cormack, and Impact of GDPR on Identity and Access Management by -Andrew Hindle. - -Standards have a big impact on the IAM space, and Corey Scholefield -offers a review of ISO/IEC 24760:2019 -- Part 1. Project management -styles also have a big impact on IAM, and we have an Introduction to -Project Management for IAM Projects from Graham Williamson and Corey -Scholefield. - -We wrap up this issue with a short list of Independent IAM -Organizations, organized by Mark Drummond, which introduces the reader -to some of the organizations that coordinate and support various aspects -of IAM around the world. - -Readers are encouraged to offer feedback via our GitHub repository -([[https://github.com/IDPros]{.underline}](https://github.com/IDPros)). -All articles will have a copy published in the 'bok' repository so -people can offer feedback, corrections, or requests for more -information. - -This is only the first issue; future releases of the BoK will extend -beyond these concepts to provide other interesting perspectives and -introduce new topics, such as the identities of things, IAM in the -Workforce as opposed to IAM from the consumer perspective, and new -standards including Verifiable Credentials and Decentralized Identity.  -The IDPro BoK will remain a collaborative effort and we welcome your -suggestions on what should change in the introduction as well as the -other articles. We particularly encourage engagement---authoring, -reviewing, participating on the BoK Committee---from a more diverse set -of individuals. There are so many people across all races, genders, and -cultures out there with the varied experience and ideas that we need to -see in the BoK; please participate! - -Thank you for your support as we create the Body of Knowledge that our -industry so desperately needs! I hope you will continue to engage with -IDPro and consider writing an article yourself for a future issue! diff --git a/terminology.md b/terminology.md index 6d6f8fe..7177e2d 100644 --- a/terminology.md +++ b/terminology.md @@ -1,4 +1,6 @@ -Heather Flanagan, editor - ©2023 IDPro +# Terminology in the IDPro Body of Knowledge + +Heather Flanagan, editor - ©2024 IDPro ***Editor’s Note:** This is a consolidated list of the terminology highlighted in each of the articles published in the Body of Knowledge @@ -26,166 +28,176 @@ via the IDPro GitHub repository: .* Abstraction -the practice of identifying and isolating repeated aspects of operations or business logic so that they can be maintained in one place and referenced in many places. +The practice of identifying and isolating repeated aspects of operations or business logic so that they can be maintained in one place and referenced in many places. Introduction to Policy-Based Access Controls (v2) +Access +The permissions, privileges, and abilities granted to users, account types, system processes, applications, or any other entities within a computing environment. +Introduction to Privileged Access Management + + Access Certification Certification is the ongoing review of who has which accesses (i.e., the business process to verify that access rights are correct). Introduction to Identity - Part 1: Admin-time (v2), Techniques To Approach Least Privilege - + Access Control Controlling who can have access to data, systems, services, resources, locations. The ‘Who’ can be a user, a device or thing, a service Introduction to Access Control - + Access Control Various methods to limit access to data, systems, services, resources, locations by a user, a device or thing, or a service. IAM Reference Architecture - + Access Control Lists Access Control Lists are definitions around who or what are allowed or denied access to a resource. For example, a file share may have an Access Control List that allows Marketing Department users to read and write, IT Department users to read-only, and denies all other users’ access. Authentication and Authorization - + Access Control System a structure that manages and helps enforce decisions about access within an organization. Introduction to Policy-Based Access Controls (v2) - + Access Governance The assurance that all access has been given based on the correct decision criteria and parameters Introduction to Access Control - + Access Governance Access Governance provides oversight and control over access rights implemented in multiple local or shared authorization systems. These rights may be controlled in a variety of ways, starting with the existence and validity of the digital identity. Other controls include various mechanisms such as policies, the mapping of roles, permissions, and identities. The abbreviation used is for Identity Governance and Administration and is commonly used in the commercial sector. This roughly corresponds to the Access Certification section of the first-class component Governance Systems in the FICAM model. IGA is not specifically addressed in the ISO/IEC model. IAM Reference Architecture - + Access Management Use of identity information to provide access control to protected resources such as computer systems, databases, or physical spaces. Introduction to IAM Architecture - + Access Management The process and techniques used to control access to resources. This capability works together with identity management and the Relying Party to achieve this goal. The model shows access management as a conceptual grouping consisting of the Access Governance function and the shared authorization component. However, access management impacts local authorization as well (through the governance function). IAM Reference Architecture - + Access Policy Definition of the rules to allow or disallow access to secured objects. Introduction to Access Control - + Access Requester The person, process, system, or thing that seeks to access a protected resource. Introduction to Access Control - + Access Supplier The component granting access to data, systems, services after the access policy requirements (set in the Policy Administration Point) have been met by the Access Requester. Introduction to Access Control - + Access Token The OAuth2 token that allows a client to get access to a protected resource An Introduction to OAuth2.0 - + Account Owner An entity that “owns” or claims responsibility for an account. Generally, an account is issued in the name of the owner(s) or their delegate(s) in the case of enterprises. Account Recovery (v2) - + Account Recovery The process of returning account access to an account owner when they lose, forget, or cannot otherwise produce the account’s nominal credentials. This may be accomplished in person, remote, or in a hybrid format. Account Recovery (v2) - + Account Recovery The process of updating a user’s credentials within a scenario where the user cannot validate those credentials   Managing Identity in Customer Service Operations - + Account Takeover Account takeover is a form of identity theft and fraud, where a malicious third party successfully gains access to a user’s account credentials. Account Recovery (v2), Designing MFA for Humans, Techniques To Approach Least Privilege - + Accountability The obligation of a person to accept the results of one’s actions, be they positive or negative. This person is probably also a species of an owner. Introduction to Access Control - + Action a protected operation available for a resource, such as “view”, “edit”, or “submit”. Introduction to Policy-Based Access Controls (v2) - + Adaptive Authentication Adaptive authentication aims to determine and enforce the authentication level required at any time during a user session - when the session is commenced, during the session when access requirements force a re-evaluation, or when the session token expires. The factors to be used in achieving that authentication level are determined dynamically based on the access control policy governing the resources being accessed, and a variety of environmental conditions and risk factors in effect at that time for that user. Designing MFA for Humans - -Agent (also “Customer Service Agent”) + +Agent (also “Customer Service Agent”) The person responsible for communicating with and solving problems on behalf of customers or end-users.  Account Recovery (v2), Managing Identity in Customer Service Operations - + Agile Project Management A framework that uses a continuous, iterative process to deliver a defined piece of functionality, typically a component of a product or service. Scrum is a popular framework (https://www.scrumalliance.org/about-scrum/overview) Introduction to IAM Project Management - + Alignment the synchronization rate of processes and environments Strategic Alignment and Access Governance - + Applicant A subject undergoing the processes of enrollment and identity proofing. Defining the Problem – Identity Proofing Challenges - + Architecture Framework for the design, deployment, and operation of an information technology infrastructure. It provides a structure whereby an organization can standardize the technology it uses and align its IT infrastructure with digital transformation policy, IT development plans, and business goals. Introduction to IAM Architecture - + Architecture Overview Describes the architecture components required for supporting IAM across the enterprise. Introduction to IAM Architecture - + Architecture Patterns Identifies the essential patterns that categorize the IT infrastructure architecture in an organization and will guide the deployment choices for IAM solutions. Introduction to IAM Architecture - + Assertion A formal message or token that conveys information about a principal, typically including a level of assurance about an authentication event and sometimes additional attribute information. Sometimes this is called a Security Token. IAM Reference Architecture - + Assurance Level A category describing the strength of the identity proofing process and/or the authentication process. See NIST SP.800-63-3 for further information. IAM Reference Architecture - + Asymmetric Cryptography Any cryptographic algorithm which depends on pairs of keys for encryption and decryption. The entity that generates the keys shares one (see Public Key) and holds and protects the other (see Private Key). They are referred to as asymmetric because one key encrypts, and the other decrypts. Practical Implications of Public Key Infrastructure for Identity Professionals + +Asymmetric Key Cryptography (aka, Public Key Cryptography) +A cryptosystem in which a pair of keys is used to encrypt and decrypt da-ta. The pair of keys has the unusual property that data encrypted with one can be decrypted only with the other. +An Introduction to Cryptography + Attribute Provider Sometimes the authority for attributes is distinguished from the authority for identities. In this case, the term Attribute Provider is sometimes used. It is a subset or type of an Identity Information Authority. IAM Reference Architecture -Attribute-Based Access Control (“ABAC”) / Claims-Based Access Control (“CBAC”) +Attribute-Based Access Control (“ABAC”) / Claims-Based Access Control (“CBAC”) a pattern of access control system involving dynamic definitions of permissions based on information (“attributes”, or “claims”), such as job code, department, or group membership. Introduction to Policy-Based Access Controls (v2), The Business Case for IAM @@ -259,7 +271,7 @@ via the IDPro GitHub repository: .* Binding Associating an authenticator with an identity.

Identity and Access Management Workforce Planning,

-

Defining the Problem – Identity Proofing Challenges

+

Defining the Problem – Identity Proofing Challenges

Bot @@ -327,6 +339,16 @@ via the IDPro GitHub repository: .* Non-Human Account Management (v2) +Cipher (aka, Encryption Algorithm) +A method for transforming plaintext into cipher-text. +An Introduction to Cryptography + + +Ciphertext +Data that has been en-crypted. +An Introduction to Cryptography + + Claimant A subject whose identity is to be verified by using one or more authentication protocols. Defining the Problem – Identity Proofing Challenges @@ -437,15 +459,35 @@ via the IDPro GitHub repository: .* Introduction to Customer Identity and Access Management +Cryptanalysis +The study of deciphering secret writing. Code breaking. +An Introduction to Cryptography + + Cryptographic Module A hardware or software component that securely performs cryptographic operations within a logical boundary. Cryptographic Modules store private keys within this boundary and use them for cryptographic functions at the request of an authorized user or process. Practical Implications of Public Key Infrastructure for Identity Professionals - + Cryptographic Module Validation Program (CMVP) A program allowing cryptographic module developers to test their modules against the requirements defined in FIPS-140. The computer security resource center under the United States National Institute of Standards and Technology (NIST) maintains a publicly available list of validated modules. Practical Implications of Public Key Infrastructure for Identity Professionals + +Cryptography +The study of secret writing. Code making. +An Introduction to Cryptography + + +Cryptology +The field of research encompassing both cryptography and cryptanalysis. +An Introduction to Cryptography + + +Cryptosystem +The collection of technologies providing cryptographic functions such as encrypting and decrypting data. +An Introduction to Cryptography + Data Controller Defined in Article 4(7) of the GDPR: “‘controller’ means the natural or legal person, public authority, agency or other body which, alone or jointly with others, determines the purposes and means of the processing of personal data;”. This article uses the term “organisation” as a synonym for “data controller”, since organisations involved in IAM will normally be data controllers. @@ -482,55 +524,65 @@ via the IDPro GitHub repository: .* A Peek into the Future of Decentralized Identity +Decrypt (aka, Decipher) +To transform ciphertext into plaintext, rendering the data intelligible. +An Introduction to Cryptography + + Delegated Authorization Framework An access control framework that decouples authentication from authorization, allowing the password to stay local and protected Introduction to Identity – Part 2: Access Management - + Digital Cards Represent verifiable credentials that users collect over time and are stored as part of the user agent or the identity hub of the user. It’s somewhat simpler to refer to them as digital cards rather than verifiable credentials when speaking about them. A Peek into the Future of Decentralized Identity - + Digital Identity the combination of a unique identifier together with relevant attributes that uniquely identifies an entity.. An Overview of the Digital Identity Lifecycle (v2) - + Digital Wallet represents a digital metaphor for a physical wallet and is generally represented by the combination of the user agent and the underlying capabilities of the computing device, such as secure storage and secure enclaves on a mobile phone. The digital wallet contains digital cards. A Peek into the Future of Decentralized Identity - + Directory A directory is a central repository for user identities and the attributes that make up those identities. A user identity might be John Smith with firstName attribute as John, lastName attribute as Smith, title attribute as Director, and Department attribute as Marketing. The attributes in the directory can be used to make authorization decisions about what this user should have access to in applications. Authentication and Authorization - + Discretionary Access Control a pattern of access control system involving static, manual definitions of permissions assigned directly to users. Introduction to Policy-Based Access Controls (v2) - + dPKI A decentralized public key infrastructure and is usually implemented via an immutable blockchain or ledger – a place where DIDs can be registered and looked up alongside the associated public keys of the DID and its metadata. dPKI can be described more generally as the verifiable data registry, as the dPKI is just one of many possible implementations for a verifiable data registry. While this paper refers to dPKI, the reader should be aware that a verifiable data registry need not necessarily be “decentralized”. A Peek into the Future of Decentralized Identity - + Electronic Identification, Authentication, and Trust Services (eIDAS) European legislation gives legal standing to electronic signatures under eIDAS. This legislation also documents providing legally binding digital signatures with X.509 certificates to comply with Qualified Signature requirements. Practical Implications of Public Key Infrastructure for Identity Professionals - + Electronic Identification, Authentication and Trust Services (eIDAS) European legislation that gives legal standing to electronic signatures. This legislation also documents how to provide legally binding digital signatures with X.509 certificates to comply with Qualified Signature. Practical Implications of Public Key Infrastructure for Identity Professionals - + Elliptic Curve Cryptography (ECC) An asymmetric cryptosystem based on calculating points along elliptic curves. Practical Implications of Public Key Infrastructure for Identity Professionals + +Encrypt (aka, Encipher) +To transform plaintext into ciphertext, rendering the data unintelligible. +An Introduction to Cryptography + Encryption Processing data using a cryptographic algorithm to provide confidentiality assurance. @@ -609,7 +661,7 @@ via the IDPro GitHub repository: .* General Data Protection Act (GDPR) -Formally, Regulation 2016/679 of the European Union, in force May 25, 2018. Available at https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32016R0679 +Formally, Regulation 2016/679 of the European Union, in force May 25, 2018. Available at https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32016R0679 An Introduction to the GDPR @@ -695,8 +747,8 @@ via the IDPro GitHub repository: .* Identity Governance and Administration (IGA) -a discipline that focuses on identity life cycle management and access control from an administrative perspective. -Introduction to Identity - Part 1: Admin-time (v2), The Business Case for IAM +A discipline that focuses on identity life cycle management and access control from an administrative perspective. +Introduction to Identity - Part 1: Admin-time (v2), The Business Case for IAM, Introduction to Privileged Access Management Identity Governance and Administration (IGA) @@ -705,7 +757,7 @@ via the IDPro GitHub repository: .* Identity Governance and Administration (IGA) -a solution for automating user management and authorizations in target systems, building on the organization’s customer and human resource processes. +A solution for automating user management and authorizations in target systems, building on the organization’s customer and human resource processes. Strategic Alignment and Access Governance @@ -811,7 +863,7 @@ via the IDPro GitHub repository: .* Joiner/Mover/Leaver The joiner/mover/leaver lifecycle of an employee identity considers three stages in the life cycle: joining the organization, moving within the organization, and leaving the organization. -Introduction to Identity - Part 1: Admin-time (v2), The Business Case for IAM +Introduction to Identity - Part 1: Admin-time (v2), The Business Case for IAM, Introduction to Privileged Access Management Journey-based Creation @@ -829,120 +881,130 @@ via the IDPro GitHub repository: .* Practical Implications of Public Key Infrastructure for Identity Professionals -Knowledge-Based Authentication (KBA) +Key (aka, Secret, secret key, encryption key +Unique input to a cryptosystem that adds randomness to the encryption process. The security of a cryptosystem is predicated on the secrecy of the key. +An Introduction to Cryptography + + +Knowledge-Based Authentication (KBA) A method of authentication that uses information known by both the end-user and the authentication service but is not necessarily a secret. Account Recovery (v2), Managing Identity in Customer Service Operations - -Knowledge-Based Authentication (KBA) + +Knowledge-Based Authentication (KBA) Identity-verification method based on knowledge of private information associated with the claimed identity. This is often referred to as knowledge-based verification (KBV) or knowledge-based proofing (KBP). Defining the Problem – Identity Proofing Challenges - + Least Privilege Also known as the Principle of Least Privilege; a resource, such as a user, must only be able to access the resources (e.g., applications, data) that are necessary for it to function. Introduction to Identity – Part 2: Access Management - + Least Privilege The principle that a security architecture should be designed so that each entity is granted the minimum system resources and authorizations that the entity needs to perform its function. (NIST Information Technology Laboratory) -Techniques To Approach Least Privilege +Techniques To Approach Least Privilege, Introduction to Privileged Access Management - + Lifecycle In the context of CIAM, lifecycle refers to the stages that an individual or entity might experience over the course of their relationship with an organization, beginning with the formation of a relationship (such as being hired into an organization or signing up for service) and ending with the severance of that relationship (such as termination or closing an account) Introduction to Customer Identity and Access Management - + Local Authorization Local authorization is handled by the RP. IAM Reference Architecture - + Metadata Management The processes and techniques that allow the collection, use, and eventual deletion of control data used by the IDM to recognize and trust the Relying Party. This corresponds to Relying Party data in the Internet2 model. IAM Reference Architecture - + MFA Prompt Bombing Also known as MFA fatigue, MFA prompt bombing is a cyber-attack technique that describes when an attacker bombards a user with mobile-based push notifications, which sometimes leads to the user to approve the request out of annoyance which might lead to an account takeover. Multi-factor Authentication - + Multi-Factor Authentication (MFA) An approach whereby a user’s identity is validated to the trust level required according to a security policy for a resource being accessed using more than one factor (something you know (e.g., password), something you have (e.g., smartphone), something you are (e.g., fingerprint). Account Recovery (v2), Introduction to Access Control - + Multilateral Federation A federation that consists of multiple entities that have agreed to a specific trust framework. There are several forms of multilateral federations, including hub-and-spoke and mesh. Multilateral federations are the most common model for academic identity federations. Federation Simplified (v2) - + National Institute of Standards and Technology (NIST) ): A US Government agency that defines and publishes various standards. One department within NIST, the Computer Security Resource Center (CSRC), publishes the Federal Information Processing Standards (FIPS) series. While these standards are only mandatory for US Government Agencies, many countries recognize them as de-facto global standards. Practical Implications of Public Key Infrastructure for Identity Professionals - + Non-Human/Person Account Any account not used by a person, such as accounts used for devices, services, and servers. Non-Human Account Management (v2) - + Non-Person Entities Any unique combination of hardware and software firmware (e.g., device) that utilizes the capabilities of other programs, devices, or services to perform a function. Non-person entities may act independently or on behalf of an authenticated individual or another NPE. Practical Implications of Public Key Infrastructure for Identity Professionals - + OAuth 2.0 OAuth 2.0 is an open-source protocol that allows Resource Owners such as applications to share data with clients by facilitating communication with an Authorization Server. That data takes the form of credentials given to applications to obtain information/data from other applications. The Authorization Server is usually the Identity Provider (IdP). The Authorization Server (AS) may provide authorization directly or indirectly. For example, the AS may supply attributes or profile data of the Resource Owner or provide access to data that can later be used for authorization purposes, such as entitlements from an Identity Management or Governance Solution. Federation Simplified (v2) - + Online Certificate Status Protocol (OCSP) A protocol that allows a client to query the Certificate Authority or a Validation Authority for the status of an individual certificate rather than downloading a CRL. Practical Implications of Public Key Infrastructure for Identity Professionals - + OpenID Connect (OIDC) OpenID Connect is a simple identity layer on top of the OAuth 2.0 protocol. It enables Clients to verify the identity of the End-User based on the authentication performed by an Authorization Server, as well as to obtain basic profile information about the End-User in an interoperable and REST-like manner. Federation Simplified (v2) - + Passwordless Any means of authenticating a user account that does not require a static stored shared secret. Techniques include one-time passwords and passkeys. Introduction to Customer Identity and Access Management - + Path Discovery and Validation (PDVal) The process to determine whether a certificate is valid and trusted by the validator. Practical Implications of Public Key Infrastructure for Identity Professionals - + Permission a statement of authorization for one or more subjects to perform one or more actions on one or more objects. Introduction to Policy-Based Access Controls (v2) - + Personal Data Defined in Article 4(1) of the GDPR: “‘personal data’ means any information relating to an identified or identifiable natural person (‘data subject’); an identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person;”. Note: “natural person” (human) is used to distinguish from companies and other corporate entities that are “legal persons”. An Introduction to the GDPR - + Personal Data Personal data are any information which are related to an identified or identifiable natural person. Account Recovery (v2), Impact of GDPR on Identity and Access Management - + Personal Identification Number (PIN) A numeric secret commonly used to unlock a private key container in software or hardware. Practical Implications of Public Key Infrastructure for Identity Professionals - + Personal Identity Verification (PIV) A US Government program designed to enable strong authentication for all government employees and contractors, based on Public Key Infrastructure. Practical Implications of Public Key Infrastructure for Identity Professionals + +Plaintext (aka, Cleartext) +Data that has not been encrypted. +An Introduction to Cryptography + Policy Administration Point (PAP) The location where the different types of owners define the access policy. @@ -1004,220 +1066,230 @@ via the IDPro GitHub repository: .* Practical Implications of Public Key Infrastructure for Identity Professionals +Privileged Access +Users or accounts with high-risk permissions, such as those that grant them access to (critical) systems, sensitive data, and configuration settings +Introduction to Privileged Access Management + + Privileged Access Management A mechanism for managing temporary access for accounts with high-risk permissions. PAM often involves check-out and check-in of a credential generated for a single use. -Techniques To Approach Least Privilege, The Business Case for IAM +Techniques To Approach Least Privilege, The Business Case for IAM, Introduction to Privileged Access Management - + Privileged Account Management (PAM) -focusing on special control for risky high-level access. Privileged Account Management (PAM) is a mechanism for getting those special accounts under control. -Introduction to Identity - Part 1: Admin-time (v2) +Focusing on special control for risky high-level access. Privileged Account Management (PAM) is a mechanism for getting those special accounts under control. +Introduction to Identity - Part 1: Admin-time (v2), Introduction to Privileged Access Management - + Processing Defined in Article 4(2) of the GDPR: “‘processing’ means any operation or set of operations which is performed on personal data or on sets of personal data, whether or not by automated means, such as collection, recording, organisation, structuring, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, restriction, erasure or destruction”. Note that even this long list of activities is not exhaustive: other activities may also fall within the definition of “processing”. Additional rules, in Article 22, apply to “automated individual decision-making, including profiling”. These generally have the effect of strengthening the rights of information and objection described later and may limit the use of automation for some high-impact decisions. An Introduction to the GDPR - + Profile A collection of attributes about an individual. The individual may provide it directly, or the organization may gather it indirectly. Introduction to Customer Identity and Access Management - + Progressive Profiling A technique to reduce customer friction by gathering Profile, preference, and Consent information over time (when needed) rather than all at once. Introduction to Customer Identity and Access Management - + Project A time-limited activity to achieve a defined outcome(s) Introduction to Project Management for IAM Projects - + Project Charter Documented authority for the project manager to proceed with a project; it will usually include a succinct statement of the project’s purpose Introduction to Project Management for IAM Projects - + Project Plan A document that describes a project; it will usually include a scope statement, schedule, resource plan, communications plan, and quality plan Introduction to Project Management for IAM Projects - + Protected Resource An API in the OAuth2 terminology An Introduction to OAuth2.0 - + Public Key A key that an entity publicly distributes. It corresponds to a private key that the entity exclusively and privately controls. Practical Implications of Public Key Infrastructure for Identity Professionals - + Public Key Certificate A certificate containing a public key, one or more identifiers for the private key holder, an identifier for the Certificate Authority, and additional metadata to support security requirements. Practical Implications of Public Key Infrastructure for Identity Professionals - + Public Key Infrastructure A set of tools, standards, and related policies designed to manage trust based on public/private key pairs and certificates. Practical Implications of Public Key Infrastructure for Identity Professionals - + Protected Resource A system, a process, a service, an information object, or even a physical location that is subject to access control as defined by the owner of the resource and by other stakeholders, such as a business process owner or Risk manager. Introduction to Access Control - + Reconciliation The process of identifying and processing changes to users and user access made directly on target systems. User Provisioning in the Enterprise - + Refresh Token The OAuth2 token that allows a client to renew an access token when it is expired without the user’s presence An Introduction to OAuth2.0 - + Registration See Enrollment Defining the Problem – Identity Proofing Challenges - + Registration The creation of a relationship between an individual and an online system that is initiated by the individual and results in the creation of a user account or Profile. Introduction to Customer Identity and Access Management - + Registration Authority (RA) An individual, system, or business function which provides registration and identity proofing for entities receiving certificates and manages the certificate issuance and renewal process. The most important responsibilities of an RA include identity proofing and binding the private key to the identity. Practical Implications of Public Key Infrastructure for Identity Professionals - + Relying Party (RP) A component, system, or application that uses the IDP to identify its users. The RP has its own resources and logic. Note that the term ‘relying service’ is used in the ISO/IEC standards to encompass all types of components that use identity services, including systems, sub-systems, and applications, independent of the domain or operator. We will use the more common Relying Party (or RP). An RP roughly corresponds to the Agency Endpoint in the FICAM model or to Identity Consumers in the Internet2 model. IAM Reference Architecture - + Remote In the context of remote authentication or remote transaction, an information exchange between network-connected devices where the information cannot be reliably protected end to end by a single organization’s security controls. Defining the Problem – Identity Proofing Challenges - + Resource or Object an asset protected by access controls, such as an application, system, or door. Introduction to Identity - Part 1: Admin-time (v2) - + Return on Investment (ROI) Return on Investment is the economic measure of value of an investment, using costs, revenues, interest rates, and lifecycle as parameters. The Business Case for IAM - + Revoke Revocation is the announcement that clients should no longer trust an individual certificate.  Practical Implications of Public Key Infrastructure for Identity Professionals - + Revised Payment Systems Directive (PSD2) PSD2 (the Revised Payment Services Directive, Directive (EU) 2015/2366) is an EU Directive, administered by the European Commission (Directorate General Internal Market) to regulate payment services and payment service providers throughout the European Union (EU) and European Economic Area (EEA). It contains many requirements specifically related to Strong Client Authentication. Designing MFA for Humans - + Risk Context (RCTX) Risk Context consists of additional facts that can be brought to bear to improve the overall security of the ecosystem. Internal or external events and facts can be applied to enable, limit, or terminate access. This is similar to the section Monitors and Sensors under FICAM’s Governance Systems and to many of the inputs of the Policy Decision Point in the NIST Special Publication 800-207, a paper on Zero Trust. IAM Reference Architecture - + Role Management -a way to group access rules to make them more manageable +A way to group access rules to make them more manageable Introduction to Identity - Part 1: Admin-time (v2) - + Role-Based Access Control (RBAC) -the use of roles at run-time; a way to govern who gets access to what through the use of roles. -Introduction to Identity - Part 1: Admin-time (v2) +The use of roles at run-time; a way to govern who gets access to what through the use of roles. +Introduction to Identity - Part 1: Admin-time (v2), Introduction to Privileged Access Management - + Role-Based Access Control (RBAC) A pattern of access control system involving sets of static, manual definitions of permissions assigned to “roles”, which can be consistently and repeatably associated with users with common access needs. Role-based access control is a control scheme in which roles are granted to identities, and those roles determine what access to resources those identities should have. Basic roles might be “admin” and “read-only user” – an admin would be able to make changes to a system and a read-only user would only be able to view resources. Introduction to Policy-Based Access Controls (v2), Authentication and Authorization - + Roles A set of permissions. A role must be associated with an individual user, and the user gains the associated authorization when they are associated with the role. Practical Implications of Public Key Infrastructure for Identity Professionals - + RSA An asymmetric cryptosystem based on large prime numbers. The acronym RSA stands for the three principal inventors, Ron Rivest, Adi Shamir, and Len Adleman. Practical Implications of Public Key Infrastructure for Identity Professionals - + S/MIME A standard for constructing and sending digitally signed or encrypted messages using asymmetric cryptography Practical Implications of Public Key Infrastructure for Identity Professionals - + Schedule A document that defines the activity and resources required to achieve the planned deliverable(s) and outcome(s) Introduction to Project Management for IAM Projects - + Scope A string designating a (part) of a protected resource that a client is authorized to access. An Introduction to OAuth2.0 - + Secure Socket Layer (SSL) A deprecated standard for encrypting data in transit; TLS has superseded it. Practical Implications of Public Key Infrastructure for Identity Professionals - + Security Assertion Markup Language (SAML) SAML is an XML-based communication protocol between SPs and IdPs. Usually, the enterprise hosts the IdP, whereas applications (including cloud services) are the SPs. Federation Simplified (v2) - + Segment a grouping of subjects that may be useful for authorizations, such as full-time employees, undergraduate students, IT administrators, or clinicians. Introduction to Policy-Based Access Controls (v2) - + Self-sovereign Identity A term that describes a digital movement that is founded on the principle that an individual should own and control their identity without the intervening administrative authorities. A Peek into the Future of Decentralized Identity - + Sender Constrained Token A token whose possession is not sufficient to enable access to a protected resource (additional proof of identity by the client application is required) An Introduction to OAuth2.0 - + Server Account An account with privileged access rights to a server’s operation typically used for configuration purposes. Non-Human Account Management (v2) - + Server-based Certificate Validation Protocol (SCVP) A protocol that allows a client to query a server to determine whether a certificate is valid and trusted. The server does not need to be associated with the issuing CA. SCVP does two things; (1) it determines the path between the end entity and the trusted root, whereby the client doesn't need to trust any intermediate CAs. (2) it also performs delegated path validation according to policy. Practical Implications of Public Key Infrastructure for Identity Professionals - + Service Account An account used by a computer application to access other applications or services for a specific purpose. Non-Human Account Management (v2) - + Service Provider (SP) Defined by the OASIS organization, which is responsible for the SAML specification, as “A role donned by a system entity where the system entity provides services to principals or other system entities.” This usually takes the form of an application that offers services requiring authentication and authorization to a user. Federation Simplified (v2) - + Session A period of time after an authentication event when an RP grants access to resources for the principal/subject. The duration of the session and the mechanism for enforcement vary by implementation. IAM Reference Architecture + +Session Key +A temporary key used to encrypt data communications during a relatively short-lived session. At the end of the session, further communication requires the use of a new session key. +An Introduction to Cryptography + Session Management A coordinating function provided by an IDP to control sessions of subscribing RPs. @@ -1235,7 +1307,7 @@ via the IDPro GitHub repository: .* Single Sign-On -Single Sign-On is a service that enables SPs to verify the identities of End Users by facilitating communication with IdPs. SSO acts as a bridge to decouple SPs and IdPs. This can happen via numerous protocols such as agent-based integrations, direct LDAP integration, SAML, and OpenID Connect, to name a few. +Single Sign-On is a service that enables SPs to verify the identities of End Users by facilitating communication with IdPs. SSO acts as a bridge to decouple SPs and IdPs. This can happen via numerous protocols such as agent-based integrations, direct LDAP integration, SAML, and OpenID Connect, to name a few. Federation Simplified (v2) @@ -1284,126 +1356,131 @@ via the IDPro GitHub repository: .* Non-Human Account Management (v2) +Symmetric Key Cryptography (aka, Private Key Cryptography) +A cryptosystem in which a single key is used to both encrypt and decrypt data. +An Introduction to Cryptography + + Task Lowest level of defined activity; multiple tasks will typically be grouped into stages of project phases Introduction to Project Management for IAM Projects - + Threat Modeling Threat modeling is an analysis technique used to help identify threats, attacks, vulnerabilities, and countermeasures that could impact an application or process. Account Recovery (v2), Designing MFA for Humans - + Tort Law The body of law that covers situations where one person’s behavior causes injury, suffering, unfair loss, or harm to another person, giving the injured person (or the person suffering damages) a right to bring a civil lawsuit for compensation from the person who caused the injury. Examples include battery, fraud, defamation, negligence, and strict liability. Laws Governing Identity Systems - + Transport Layer Security (“TLS” ) A cryptographic protocol designed to provide confidentiality and integrity of communications between two endpoints. Practical Implications of Public Key Infrastructure for Identity Professionals - + Trust Federation a trust framework between multiple entities with the purpose of leveraging identity and access management information in a controlled fashion Introduction to Identity – Part 2: Access Management - + Trust Framework This component represents the legal, organizational, and technical apparatus that enables trust between the IDM and the RPs. IAM Reference Architecture - + Trust Root A technical structure that provides the IDP and RP the ability to recognize each other with a high degree of certainty. This is similar to the concept of Trust Anchor (NIST SP.800-63-3), but we allow for a structure that relies on a mutually agreed-upon third party. A trust root derives from the operation of a Trust Framework. IAM Reference Architecture - + Two-Factor Authentication (2FA) A specific case of Multi-Factor Authentication (see: IDPro’s Consolidated Terminology) where two factors must be checked to validate a user’s identity. Designing MFA for Humans - + Universal Resolver An identifier resolver that works with any decentralized identifier system through DID drivers. The purpose of a universal resolver is to return a DID document containing DID metadata when given a specific DID value. This capability is very useful because DIDs can be anchored on any number of disparate dPKI implementations. A Peek into the Future of Decentralized Identity - + User or Subject a person or entity who may receive access within an access control system. Introduction to Policy-Based Access Controls (v2) - + User Agent A user agent is any software that retrieves, renders, and facilitates end-user interaction with Web content. Cloud Service Authenticates Via Delegation – SAML - + User Provisioning The means by which user accounts are created, maintained, and deactivated/deleted in a system according to defined policies. User Provisioning in the Enterprise - + User Provisioning and Lifecycle Management how user records get where they need to be but only as long as they are needed Introduction to Identity - Part 1: Admin-time (v2) - + Username a common term used for an external identifier Identifiers and Usernames - + Username An identifier unique to the authentication service used in conjunction with a shared secret to authenticate a user. Account Recovery (v2), Managing Identity in Customer Service Operations - + Validator An entity that verifies a certificate and confirms that the other party controls the private key in the transaction. Practical Implications of Public Key Infrastructure for Identity Professionals - + Verifiable Credentials Attestations that an issuer makes about a subject. Verifiable credentials are digitally signed by the issuer. A Peek into the Future of Decentralized Identity - + Verifiable Presentations The packaging of verifiable credentials, self-issued attestations, or other such artifacts that are then presented to verifiers for verification. Verifiable presentations are digitally signed by the holder and can encapsulate all the information that a verifier is requesting in a single package. This is also the place where holders can describe the specific terms of use under which the presentation is performed. A Peek into the Future of Decentralized Identity - + Verifier The entity that verifies verifiable credentials so that it can provide services to a holder. A Peek into the Future of Decentralized Identity - + Workforce Framework An outline of the job categories, work roles, and competency models needed to execute workforce planning. Identity and Access Management Workforce Planning - + Workforce IAM The application of IAM sub-disciplines such as access governance, authentication, and Authorization for employees as opposed to the applications of such disciplines for customers. Introduction to Customer Identity and Access Management - + Workforce Planning Activities that ensure an organization has the right talent to execute business and technical objectives. Identity and Access Management Workforce Planning - + X.509 An ISO standard from the X.500 series that defines the basic rules for encoding public key certificates. Practical Implications of Public Key Infrastructure for Identity Professionals - + Zero Standing Privilege (ZSP) a state where JIT access is used for all permissions and no long-standing permissions are assigned to principals. Techniques To Approach Least Privilege - + Zero Trust From NIST Draft Special Publication 800-207, “Zero trust assumes there is no implicit trust granted to assets or user accounts based solely on their physical or network location (i.e., local area networks versus the internet)” Introduction to Identity – Part 2: Access Management diff --git a/~$nsolidated-terminology-issue13.docx b/~$nsolidated-terminology-issue13.docx new file mode 100644 index 0000000..8c776e3 Binary files /dev/null and b/~$nsolidated-terminology-issue13.docx differ