QAF5.2.IAM301

1234567891011121314
Across
  1. 3. Linking identities across organizations or systems
  2. 6. Single Sign-On allowing one login for multiple apps
  3. 8. Result of unsynchronized clocks in SSO systems
  4. 9. Restricting token use to one specific device
  5. 11. Multi-Factor Authentication adding extra login security
  6. 12. Granting only the access needed to perform a job
  7. 14. Privileged Access Management for admin accounts
Down
  1. 1. Security model that verifies every access request
  2. 2. Attack type limited by short token lifespans
  3. 4. Temporary credential used for authentication
  4. 5. Digital credential whose misconfiguration causes trust issues
  5. 7. Analogy for IAM verifying user access like a club guard
  6. 10. Protocol that uses timestamps to prevent tampering
  7. 13. Manages who can access which systems or resources