Matching
Match each item with a statement below:
Premises:
a traditional authentication method for Windows operating systems using a simple challenge response protocol
protocol that picks one of the available authentication methods for a system
the core authentication class in JAAS
a framework for authentication and authorization in Internet protocols
divides authentication into the authentication interface library, and the actual authentication mechanism-specific modules
a place where a number of services are being offered
a feature that enables users to access resources over the network without having to repeatedly supply their credentials
retrieves and makes available NT security information for the current user
allows fine-grained control over the mapping between access control and tasks performed in the deployment area
Responses:
PAM
LoginContext
NTSystem PAM
Single sign-on
SASL
Resource
Role-based authorization
NTLM authentication
Negotiate
Correct Answer:
Premises:
Responses:
allows fine-grained control over the mapping between access control and tasks performed in the deployment area
Role-based authorization
retrieves and makes available NT security information for the current user
NTSystem PAM
a feature that enables users to access resources over the network without having to repeatedly supply their credentials
Single sign-on
a place where a number of services are being offered
Resource
protocol that picks one of the available authentication methods for a system
Negotiate
divides authentication into the authentication interface library, and the actual authentication mechanism-specific modules
PAM
a traditional authentication method for Windows operating systems using a simple challenge response protocol
NTLM authentication
the core authentication class in JAAS
LoginContext
a framework for authentication and authorization in Internet protocols
SASL
Premises:
allows fine-grained control over the mapping between access control and tasks performed in the deployment area
retrieves and makes available NT security information for the current user
a feature that enables users to access resources over the network without having to repeatedly supply their credentials
a place where a number of services are being offered
protocol that picks one of the available authentication methods for a system
divides authentication into the authentication interface library, and the actual authentication mechanism-specific modules
a traditional authentication method for Windows operating systems using a simple challenge response protocol
the core authentication class in JAAS
a framework for authentication and authorization in Internet protocols
Responses:
Role-based authorization
NTSystem PAM
Single sign-on
Resource
Negotiate
PAM
NTLM authentication
LoginContext
SASL
Related Questions
Q1: Compare one-factor and multiple-factor authentication.
Q3: Authentication in JAAS is performed in a
Q4: What are the main goals of JAAS?
Q5: _ authentication is usually used with lightweight
Q6: What are some of the benefits of
Q7: The _ PAM module provides a JAAS
Q8: What are the general steps performed when
Q9: Java 2 provides access controls based on
Q10: _ is concerned with what an identity
Q11: The JAAS framework defines the term _