Page 992 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 992
As an example, Windows systems include the Credential Manager tool.
Users enter their credentials into the Credential Manager and when
necessary, the operating system retrieves the user’s credentials and
automatically submits them. When using this for a website, users enter
the URL, username, and password. Later, when the user accesses the
website, the Credential Manager automatically recognizes the URL
and provides the credentials.
Third-party credential management systems are also available. For
example, KeePass is a freeware tool that allows you to store your
credentials. Credentials are stored in an encrypted database and users
can unlock the database with a master password. Once unlocked, users
can easily copy their passwords to paste into a website form. It’s also
possible to configure the app to enter the credentials automatically
into the web page form. Of course, it’s important to use a strong
master password to protect all the other credentials.
Integrating Identity Services
Identity services provide additional tools for identification and
authentication. Some of the tools are designed specifically for cloud-
based applications whereas others are third-party identity services
designed for use within the organization (on-premises).
Identity as a service, or identity and access as a service (IDaaS), is a
third-party service that provides identity and access management.
IDaaS effectively provides SSO for the cloud and is especially useful
when internal clients access cloud-based software as a service (SaaS)
applications. Google implements this with their motto of “One Google
Account for everything Google.” Users log into their Google account
once and it provides them access to multiple Google cloud-based
applications without requiring users to log in again.
As another example, Office 365 provides Office applications as a
combination of installed applications and SaaS applications. Users
have full Office applications installed on their user systems, which can
also connect to cloud storage using OneDrive. This allows users to edit
and share files from multiple devices. When people use Office 365 at
home, Microsoft provides IDaaS, allowing users to authenticate via the

