
Sign up to save your podcasts
Or


The dicussion in this podcast provides an extensive overview of Identity and Access Management (IAM) concepts, focusing on the critical phases of identification, authentication, and authorization within secure systems. They detail various authentication methods, including passwords, multi-factor authentication (MFA), and biometrics, explaining the mechanics and weaknesses of each. A significant portion covers different access control models such as Discretionary (DAC), Mandatory (MAC), and Role-Based (RBAC), alongside the use of XML-based markup languages like SAML and XACML for secure data exchange in web services. Furthermore, it examines centralized remote access technologies like RADIUS, TACACS+, and Diameter, the functions of Kerberos for Single Sign-On (SSO), and the entire identity and access provisioning life cycle, including the necessity of both logical and physical access controls.
 By HelloInfoSec
By HelloInfoSecThe dicussion in this podcast provides an extensive overview of Identity and Access Management (IAM) concepts, focusing on the critical phases of identification, authentication, and authorization within secure systems. They detail various authentication methods, including passwords, multi-factor authentication (MFA), and biometrics, explaining the mechanics and weaknesses of each. A significant portion covers different access control models such as Discretionary (DAC), Mandatory (MAC), and Role-Based (RBAC), alongside the use of XML-based markup languages like SAML and XACML for secure data exchange in web services. Furthermore, it examines centralized remote access technologies like RADIUS, TACACS+, and Diameter, the functions of Kerberos for Single Sign-On (SSO), and the entire identity and access provisioning life cycle, including the necessity of both logical and physical access controls.