Home Identity and Access Management
Post
Cancel

Identity and Access Management

Learn about identification, authentication, authorisation, accounting, and identity management.

THM Room : https://tryhackme.com/room/iaaaidm

TASK 1 Introduction

Answer : Security Principles

TASK 2 IAAA Model

You are granted access to read and send an email. What is the name of this process?

Answer : Authorisation

Which process would require you to enter your username?

Answer : Identification

Although you have write access, you should only make changes if necessary for the task. Which process is required to enforce this policy?

Answer : Accountability

TASK 3 Identification

Which of the following cannot be used for identification?

1
2
3
4
1. Email address
2. Mobile number with international code
3. Year of birth
4. Passport number

Answer : 3

Which of the following cannot be used for identification?

1
2
3
4
1. Landline phone number
2. Street number
3. Health insurance card number
4. Student ID number

Answer : 2

TASK 4 Authentication

Answer the following questions using the correct item number from the numbered list below.

1
2
3
4
1. Something you know
2. Something you have
3. Something you are
4. 2FA 

When you want to check your email, you enter your username and password. What kind of authentication is your email provider using?

Answer : 1

Your bank lets you finish most of your banking operations using its app. You can log in to your banking app by providing a username and a password and then entering the code received via SMS. What kind of authentication is the banking app using?

Answer : 4

Your new landline phone system at home allows callers to leave you a message when the call is not picked up. You can call your home number and enter a secret number to listen to recorded messages. What kind of authentication is being used here?

Answer : 1

You have just started working at an advanced research centre. You learned that you need to swipe your card and enter a four-digit PIN whenever you want to use the elevator. Under which group does this authentication fall?

Answer : 4

TASK 5 Authorisation and Access Control

In the following questions, answer with 1 or 2 to indicate:

1
2
1. Authorisation
2. Access Control

The new policy states that the secretary should be able to send an email on the manager’s behalf. What is this policy dictating?

Answer : 1

You shared a document with your colleague and gave them view permissions so they could read without making changes. What would ensure that your file won’t be modified?

Answer : 2

The hotel management decided that the cleaning staff needed access to all the hotel rooms to do their work. What phase is this decision part of?

Answer : 1

TASK 6 Accountability and Logging

Ensure you have read the above before moving on.

No Answer.

TASK 7 Identity Management

What does IdM stand for?

Answer : Identity Management

What does IAM stand for?

Answer : Identity and Access Management

TASK 8 Attacks Against Authentication

The attacker could authenticate using the user’s response when the authentication protocol required a password encrypted with a shared key. What is the name of the attack?

Answer : replay attack

TASK 9 Access Control Models

Answer the following questions using the correct item number from the numbered list below.

1
2
3
1. DAC
2. RBAC
3. MAC

You are sharing a document via a network share and giving edit permission only to the accounting department. What example of access control is this?

Answer : 2

You published a post on a social media platform and made it only visible to three out of your two hundred friends. What kind of access control did you use?

Answer : 1

TASK 10 Single Sign-On

“SSO allows organisations to authenticate users once before granting them access to the resources required for their work. We can achieve many advantages from this. We will mention a few.

1
2
3
4
One strong password: Expecting a user to remember a single strong password is more acceptable than asking them to remember ten different strong passwords.
Easier MFA: Adding MFA to every different service is a humongous task to accomplish and maintain. With SSO, MFA needs to be enabled and configured once.
Simpler Support: Support requests like password reset become more straightforward as they are now confined to a single account.
Efficiency: A user does not need to log in every time they need to access a new service."

What does SSO stand for?

Answer : Single Sign-On

Does SSO simplify MFA use as it needs to be set up once? (Yea/Nay)

Answer : YEA

Is it true that SSO can be cumbersome as it requires the user to remember and input different passwords for the various services? (Yea/Nay)

Answer : NAY

Does SSO allow users to access various services after signing in once? (Yea/Nay)

Answer : YEA

Does the user need to create and remember a single password when using SSO? (Yea/Nay)

Answer : YEA

TASK 11 Scenarios

Flag Flag

Answer : {THM_ACCESS_CONTROL}

TASK 12 Conclusion

Ensure that you have taken notes of the concepts and terms presented in this room.

No Answer.

This post is licensed under CC BY 4.0 by the author.