Identification and authentication can be an annoying process for end users and difficult to manage for organizations. The concepts of federation and single sign-on seek to reduce some of this burden. In this video, learn the concepts of single sign-on, federation, and transitive trusts.
- [Instructor] Identification and authentication…can be an annoying process for end-users,…and difficult to manage for organizations.…The concepts of federation and single sign-on…seek to reduce some of this burden.…Federated identity management leverages the fact…that a single individual may have accounts…across a wide variety of systems.…When organizations agree to federate their identity…management systems they share some of this information…across the organizations.…This reduces the number of individual identities…that a user must have and eases the burden…on both the user and the organization.…
You're probably already familiar with some…federated identity management systems.…When you log on to websites using your Google account,…Facebook Connect, or Twitter account…you're using federated identity management.…Single sign-on goes a step further…and shares authenticated sessions across systems.…Many organizations create SSO solutions…within their organizations to help users…avoid the burden of repeatedly authenticating.…
You can sign up for Mike's free study group at certmike.com, and find his study guides at the Sybex test prep site. To review the complete CISSP Body of Knowledge, visit https://www.isc2.org/cissp-domains/default.aspx.
Note: This course is part of a series releasing throughout 2018. A complete learning path will be available once all the courses are released.
- Identity and access management overview
- Identification mechanisms: user names, access cards, biometrics, and registration
- Authentication factors
- Password authentication protocols
- Identity as a service (IDaaS)
- Enforcing accountability
- Managing credentials with policies
- Using access control lists
- Defending against access control attacks
Skill Level Advanced
1. Identity and Access Management
5. Credential Management
7. Access Control Attacks
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.