Page 984 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 984

subject.

               The primary disadvantage to SSO is that once an account is
               compromised, an attacker gains unrestricted access to all of the

               authorized resources. However, most SSO systems include methods to
               protect user credentials. The following sections discuss several
               common SSO mechanisms.


               LDAP and Centralized Access Control

               Within a single organization, a centralized access control system is
               often used. For example, a directory service is a centralized database
               that includes information about subjects and objects. Many directory

               services are based on the Lightweight Directory Access Protocol
               (LDAP). For example, the Microsoft Active Directory Domain Services
               is LDAP-based.

               You can think of an LDAP directory as a telephone directory for
               network services and assets. Users, clients, and processes can search
               the directory service to find where a desired system or resource
               resides. Subjects must authenticate to the directory service before

               performing queries and lookup activities. Even after authentication,
               the directory service will reveal only certain information to a subject,
               based on that subject’s assigned privileges.

               Multiple domains and trusts are commonly used in access control
               systems. A security domain is a collection of subjects and objects that
               share a common security policy, and individual domains can operate
               separately from other domains. Trusts are established between the

               domains to create a security bridge and allow users from one domain
               to access resources in another domain. Trusts can be one-way only, or
               they can be two-way.


               LDAP and PKIs

               A public-key infrastructure (PKI) uses LDAP when integrating digital
               certificates into transmissions. Chapter 7 covers a PKI in more depth,
               but in short, a PKI is a group of technologies used to manage digital
               certificates during the certificate lifecycle. There are many times when

               clients need to query a certificate authority (CA) for information on a
   979   980   981   982   983   984   985   986   987   988   989