Page 148 - CISSO_Prep_ Guide
P. 148

access permissions according to the policies and access control
            procedures of the organization. This prevents a local office from
            setting up access permissions according to a local, inconsistent
            process.

            A centralized system can be set up to manage access as a front
            end portal or as a backend authentication server using a product
            like RADIUS or TACACS+.



            Decentralized Access Control
            Decentralized access control is when a local office or system
            owner has the authority to manage access permissions directly.
            This is an ideal solution for an organization that is quite spread
            out, with many local variances and local operating
            environments. This method is flexible to local needs, quickly
            responsive, and much less bureaucratic. However, it is rife with
            security flaws - a manager may just grant too much access to
            staff, may violate privacy laws, may set up access
            inconsistently, and may not review access permissions or logs
            regularly.



            Federated Identity Management
            Many organizations today use federated identity management to
            allow customers to log in once to a trusted business partner and
            then access the systems and data from other partners in the
            federation without having to log in repeatedly to each partner.
            This process uses the Security Association Markup Language
            (SAML) and security artifacts to manage user access. This
            makes the interaction between the user and the web-based
            services of an organization much more user-friendly and
   143   144   145   146   147   148   149   150   151   152   153