Across
- 1. Issues tickets and Kerberos authentication
- 3. methods exposed by a script or program that allow other scripts or programs to use it.
- 6. Standards, best practices, and guidelines
- 7. XML-based data format used to exchange authentication information
- 10. access control model where resources are protected by ACLs & managed by admins
- 11. access control model where each resource is protected by an access control list
- 15. An XML-based web services protocol used to exchange messages
- 16. token issued to an authenticated account
- 17. A number used with authentication devices such as smartcards
Down
- 2. Three principles of security control and management
- 4. A collection of access control entries
- 5. authentication scheme that requires at least two different factors as credentials
- 7. value assigned to an account by windows
- 8. access control model where resources are protected by system-defined rules
- 9. A standard for federated identity management
- 10. stateless style used by web applications
- 12. access control technique that evaluates a set of attributes that each subject possesses
- 13. file format that uses attribute-value pairs
- 14. A password that is generated for use in one specific session
- 18. provides identification, authentication, and authorization mechanisms for users
