Identity, Access, and Accounts
In this chapter, you will
• Examine how to compare and contrast identity and access management concepts
• Explore how to differentiate common account management practices when given a scenario
Access control and authentication are important to control who has access to computer systems and resources. Principles of controlling access and properly authenticating apply to both internal access and remote access. Remote access requirements are more rigorous, but the same principles can be applied to internal access.
Access control mechanisms work together with accounts and account policies to determine the proper level of access for users on systems. The chapter will examine authentication systems, account ...