Page 982 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 982

something like 45 days. When the password expires, the user is
               informed that the password must be changed and the user does so.

               However, a service can’t respond to such a message and instead is just
               locked out.

               Because a service account has a high level of privileges, it is configured
               with a strong, complex password that is changed more often than
               regular users. Administrators need to manually change these
               passwords. The longer a password remains the same, the more likely it

               will be compromised. Another option is to configure the account to be
               non-interactive, which prevents a user from logging onto the account
               using traditional logon methods.

               Services can be configured to use certificate-based authentication.
               Certificates are issued to the device running the service and presented
               by the service when accessing resources. web-based services often use
               application programming interface (API) methods to exchange

               information between systems. These API methods are different
               depending on the web-based service. As an example, Google and
               Facebook provide web-based services that web developers use, but
               their implementations are different.
   977   978   979   980   981   982   983   984   985   986   987