QAF5.2.IAM301
Across
- 3. Linking identities across organizations or systems
- 6. Single Sign-On allowing one login for multiple apps
- 8. Result of unsynchronized clocks in SSO systems
- 9. Restricting token use to one specific device
- 11. Multi-Factor Authentication adding extra login security
- 12. Granting only the access needed to perform a job
- 14. Privileged Access Management for admin accounts
Down
- 1. Security model that verifies every access request
- 2. Attack type limited by short token lifespans
- 4. Temporary credential used for authentication
- 5. Digital credential whose misconfiguration causes trust issues
- 7. Analogy for IAM verifying user access like a club guard
- 10. Protocol that uses timestamps to prevent tampering
- 13. Manages who can access which systems or resources