Across
- 4. Granting access that is limited
- 6. Standard preconfigured passwords
- 9. Single sign-on for networks owned by different organizations
- 10. An access control scheme that is the most restrictive
- 14. evidence or proof of something
- 15. features and characteristics of the individual
- 16. Removing user accounts
- 17. Granting or denying approval to use specific resources
- 19. The ability of systems to exchange information
Down
- 1. Requiring the user to provide proof that they are the unique user.
- 2. The point in time when a password is no longer valid
- 3. allows secure web domains to exchange user authentication and authorization data
- 4. enables users to access a network resource through a directory service
- 5. An access control scheme that is the least restrictive
- 7. Using more than one type of authentication credential
- 8. Adding a random string to a hash algorithm for enhanced security
- 11. A key pair “burned” into a security key
- 12. small number of passwords used when trying several different user accounts
- 13. provide control over user validation and the resources that may be accessed
- 18. An open-source federation framework
