Aaa authentication what is
Any frivolous authorization can result in accidental or malicious violations of security policy. Accounting data is used for trending, detecting breaches, and forensic investigating.
Keeping track of users and their activities serves many purposes. For example, tracing back to events leading up to a cybersecurity incident can prove very valuable to a forensics analysis and investigation case. Identity Management and Network Access Control are two important tenants of a sound security policy. Users are assigned authorisation levels that define their access to a network and associated resources. For example, a user might be able to type commands, but only be permitted to show execute certain commands.
This may be based on geographical location restrictions, date or time-of-day restrictions, frequency of logins, or multiple logins by a single user. Other types of authorisation include route assignments, IP address filtering, bandwidth traffic management, and encryption. An administrator may have privileged access, but even they may be restricted from certain actions.
For example, in more secure application architectures passwords are stored salted with no process for decrypting. These secure applications enable passwords to be changed with existing passwords being overridden , but never retrieved.
Accounting measures the resources users consume during access to a network or application, logging session statistics and user information including session duration, and data sent and received. Usage information is used for authorisation control, billing, trend analysis, resource utilisation, and capacity planning activities.
Accounting ensures that an audit will enable administrators to login and view actions performed, by whom, and at what time. One restriction of the accounting component of AAA security is that it requires an external AAA security server to store actual accounting records. Authentication provides a method of identifying a user, typically by having the user enter a valid username and password before access to the network is granted.
Authentication is based on each user having a unique set of login credentials for gaining network access. The AAA server compares a user's authentication credentials with other user credentials stored in a database; in this case, that database is Active Directory. If the user's login credentials match, the user is granted access to the network. Chapter 5. Authentication, Authorization, and Accounting. Secure Copy. Chapter 6. Access List Introduction. Access List Overview.
Basic ACL Configuration. Wildcard Masks. Chapter 7. Basic Access Lists. Types of ACLs. Additional ACL Features. Protection Against Attacks.
Blocking Unnecessary Services. Chapter 8. Reflexive Access Lists. Overview of Reflexive ACLs. Configuring Reflexive ACLs. Reflexive ACL Examples. Chapter 9. Context-Based Access Control.
CBAC Functions. Operation of CBAC. CBAC Performance. CBAC Limitations. CBAC Configuration. CBAC Examples. Chapter Filtering Web and Application Traffic. Java Applets. URL Filtering. Network-Based Application Recognition. Part V: Address Translation and Firewalls. Address Translation. Address Translation Overview. How Address Translation Works. Address Translation Configuration. Address Translation Issues. Embedded Addressing Information. Controlling Address Translation.
Address Translation and Redundancy. Traffic Distribution with Server Load Balancing. Lock-and-Key Access Lists. Lock-and-Key Overview. Lock-and-Key Configuration. Lock-and-Key Example. Authentication Proxy. Introduction to AP. AP Configuration.
0コメント