Reply To: OCU C)ISSO A Discussion Lesson 03
Identity management, authentication techniques, single sign-on, and access control monitoring are all concepts related to the security of a system and to the identity of users.
Identity management allows user to have a unique identity that lets them access data on the system, which is key for system security. Single sign-on uses identities like this to log in a user. However, single sign-on specifically allows a user to have access to related systems by using the same log in that was used for one system. Thus, this allows a user to save time logging in while also maintaining security and their own identity on the system.
Some authentication techniques related to single sign-on can be scripting authentication (script commands) or directory services, which are network services that identify network resources. Authentication provides security by verifying a user’s identity before granting them access to the system.
Finally, access control monitoring involves reviewing logs/audits and user permissions to know what is going on when a user accesses the system. This provides security, and it matters the identity of the user in order to use that information correctly.