CHAPTER 12

Authentication and Authorization

In this chapter, you will

•   Learn how to identify and implement authentication methods, factors, and attributes

•   Learn about authorization design concepts and requirements

One of the core tenets of computer security is the concept that all actions will be controlled via a system of approvals; for example, only authorized parties can perform the actions of accessing a resource, operating on a resource, and storing an item. Identity and access management systems are the mechanisms by which this is accomplished. This chapter examines the foundational elements behind authentication systems.

Certification Objective  This chapter covers CompTIA Security+ exam objective 2.4: Summarize authentication ...

Get CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601)), 6th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.