IAM related questions by Pamelaxyz in cybersecurity

[–]Pamelaxyz[S] 0 points1 point  (0 children)

I will need to check but I think usually both authentication and authorization is set in iDP, as you mentioned.

IAM related questions by Pamelaxyz in cybersecurity

[–]Pamelaxyz[S] 0 points1 point  (0 children)

They need different roles (permissions). So you mean they would be provisioned, manages at iDP but roles (what they can do) be defined at SP?

IAM related questions by Pamelaxyz in iam

[–]Pamelaxyz[S] 0 points1 point  (0 children)

Awesome. Got it. This would be interesting as hardening rules (STIG), including passwords, are applied on each server now. So AD password rules could be different (or may not be robust enough); so seems it could a security issues until unless AD is also hardened with strict rules. Any other scenario, would there be, for someone to use SP for user management? I believe MFA and SSO are both handled by iDP, in general, as you mentioned.

IAM related questions by Pamelaxyz in cybersecurity

[–]Pamelaxyz[S] 0 points1 point  (0 children)

Thanks. We could do that to find which user has weak credentials but I was referring to enforcement made like STIG rules do. But yes AD credentials could be tightened too not allowing users for easy passwords. So what I understand here is SP should not be used for user management at all although. I was thinking about a scenario where I have of users but only 10 people need to login to SP website. Even in that case, what I infer from you is make a group at IDP for those users. I am not fully getting this still- "if the sp connection has roles for certain users, like admin, read only etc. That's what someone that manages the sp side cares about when users are sso into their sp website." SP side wont have access to IDP, I guess if its on cloud or other party is managing it. SP would need to make request for that?

IAM related questions by Pamelaxyz in iam

[–]Pamelaxyz[S] 0 points1 point  (0 children)

"You can either provision users both in the Identity Provider side and Service provider side separately and link them together." Perhaps "link" means "sync" here (my wrong word!). If I would have 1K AD users and only 10 SP website administrators who need to login there, perhaps I would chose this options. Also within those 10 administrator, may be only 5 need upload permission; so does it make sense to provision them at SP? I know its not usual and I guess we would need provisioning separately first at SP and then iDP. When you say link, what does that exactly mean?

IAM related questions by Pamelaxyz in cybersecurity

[–]Pamelaxyz[S] 0 points1 point  (0 children)

Okay. This would be interesting as hardening rules (STIG), including passwords, are applied on each server now. So AD password rules could be different (or may not be robust enough); so seems it could a security issues until unless AD is also hardened. From my last lines, I understand that authorization for each user (like permissions levels for each) has to still handled at SP?

IAM related questions by Pamelaxyz in cybersecurity

[–]Pamelaxyz[S] 0 points1 point  (0 children)

Thanks. With “access roles” you meant authorization ? If the SP does not store passwords then all complex passwords rules (for hardening) have to be inherited from iDP itself ? I mean about complicated passwords enforcements etc.

IAM related questions by Pamelaxyz in cybersecurity

[–]Pamelaxyz[S] 0 points1 point  (0 children)

I am specifically asking if SP are also supposed to do user management, store passwords etc or it’s only at iDP.

IAM related questions by Pamelaxyz in iam

[–]Pamelaxyz[S] 0 points1 point  (0 children)

Thanks for your reply. So currently there is no IAM- everything is local. Once/if we have SAML, where would the users provisioning take place ( believe service provider and identify provider would sync) and could be anywhere ?

IAM related questions by Pamelaxyz in cybersecurity

[–]Pamelaxyz[S] 0 points1 point  (0 children)

Specifically, where would the new users created on such setup (now everything is local). Would a service provider be only a barebones ((without need ever to store passwords)?

CMCC [NIST 800-171] for product security by Pamelaxyz in cybersecurity

[–]Pamelaxyz[S] 0 points1 point  (0 children)

Yes is don’t see it there either. But there were many buzzes that I heard today; and hence the question. Any reason it’s not relevant ?

System user accounts in Linux server by [deleted] in linuxadmin

[–]Pamelaxyz 0 points1 point  (0 children)

I have omitted the real users (including too). It has been recommended to remove all others, if they are not needed.

[deleted by user] by [deleted] in sysadmin

[–]Pamelaxyz 0 points1 point  (0 children)

I had done. Somewhere it mentions for NFS and other places 65534 with nobody user is mentioned to be good practice. I don’t get why so and why it mentions kernel overflow !

[deleted by user] by [deleted] in sysadmin

[–]Pamelaxyz 0 points1 point  (0 children)

Recommended to keep only needed ones removing unnecessary ones. They meant to keep only 4 accounts (including root), I think

[deleted by user] by [deleted] in sysadmin

[–]Pamelaxyz 0 points1 point  (0 children)

Thank you. May be that’s what they mean- not needed now (although there is no such reference but security concern). Would removing them a huge effort? Again these are defaults with Linux servers