Summary
This chapter covered user access controls and management. It discussed how organizations can protect against attackers using either physical or technical controls to breach their systems. A major role of the chief security officer and the CISSP is to secure identity access with centralized utilities such as SSO so that users can do their jobs. Users add to security by using strong passwords.
You learned how user access to ancillary products, either within the organization or online, can be simplified if system administrators enable SAML or OAuth 2.0, which provides user identity federation. This keeps users from having to re-authenticate when working on ancillary systems or purchasing related products. These systems use a type of service provider or resource server to manage the identity on the ancillary service.
You also examined identity as a service (IDaaS), a feature for managing identity federation. Through IDaaS, corporations can hire firms to ease their authentication...