PrepAway - Latest Free Exam Questions & Answers

What technology within identity management is illustrated in the graphic that follows?

What technology within identity management is illustrated in the graphic that follows?

PrepAway - Latest Free Exam Questions & Answers

A.
User provisioning

B.
Federated identity

C.
Directories

D.
Web access management

Explanation:
B: A federated identity is a portable identity, and its associated entitlements, that can be used across business boundaries. It allows a user to be authenticated across multiple IT
systems and enterprises. Identity federation is based upon linking a user’s otherwise distinct identities at two or more locations without the need to synchronize or consolidate directory
information. Federated identity offers businesses and consumers a more convenient way of accessing distributed resources and is a key component of e-commerce.
A is incorrect because user provisioning refers to the creation, maintenance, and deactivation of user objects and attributes as they exist in one or more systems, directories, or
applications, in response to business processes. User provisioning software may include one or more of the following components: change propagation, self-service workflow,
consolidated user administration, delegated user administration, and federated change control. User objects may represent employees, contractors, vendors, partners, customers, or
other recipients of a service. Services may include electronic mail, access to a database, access to a file server or mainframe, and so on. User provisioning can be a function with
federation identification, but this is not what the graphic illustrates.
C is incorrect because while most enterprises have some type of directory that contains information pertaining to the company’s network resources and users, they do not commonly
spread across different businesses. Most directories follow a hierarchical database format, based on the X.500 standard, and a type of protocol, as in Lightweight Directory Access
Protocol (LDAP), that allows subjects and applications to interact with the directory. Applications can request information about a particular user by making an LDAP request to the
directory, and users can request information about a specific resource by using a similar request. While directories can work within a federated framework, this is not what the graphic
shows.
D is incorrect because Web access management (WAM) software controls what users can access when using a Web browser to interact with Web-based enterprise assets. This
type of technology is continually becoming more robust and experiencing increased deployment. This is because of the increased use of e-commerce, online banking, content
providing, Web services, and more. More complexity comes in with all the different ways a user can authenticate (password, digital certificate, token, and others), the resources and
services that may be available to the user (transfer funds, purchase product, update profile, and so forth), and the necessary infrastructure components. The infrastructure is usually
made up of a Web server farm (many servers), a directory that contains the users’ accounts and attributes, a database, a couple of firewalls, and some routers, all laid out in a tiered
architecture.


Leave a Reply