Identity & Access Management – CompTIA Security+ Study Guide
Overview
Identity and Access Management (IAM) is a foundational domain of the CompTIA Security+ exam covering how organizations verify who users are, control what they can access, and manage credentials and privileges. This guide covers authentication factors, access control models, identity management, federation protocols, and account security practices. Mastery of these concepts is essential for both the exam and real-world security operations.
---
Authentication Concepts
Summary
Authentication is the process of proving an identity is valid. It builds upon identification and relies on one or more factors of proof. Biometric systems introduce statistical error rates that measure accuracy, and modern authentication technologies like passkeys and OTPs have evolved to reduce reliance on static passwords.
The Three Factors of Authentication
| Factor | Category | Examples |
|--------|----------|---------|
| Something you know | Knowledge | Password, PIN, security question |
| Something you have | Possession | Smart card, hardware token, phone |
| Something you are | Inherence | Fingerprint, retina scan, facial recognition |
> Multi-Factor Authentication (MFA) requires at least two different factor types. Using two passwords is NOT MFA — it is two-step verification within the same factor.
Identification vs. Authentication
> Think: Identify → Authenticate → Authorize (IAA flow)
Biometric Error Rates
| Term | Definition | Security Implication |
|------|-----------|---------------------|
| False Acceptance Rate (FAR) | Rate at which an unauthorized user is incorrectly accepted | Lower FAR = more secure against impostors |
| False Rejection Rate (FRR) | Rate at which an authorized user is incorrectly rejected | Lower FRR = more convenient for legitimate users |
| Crossover Error Rate (CER) | Point where FAR = FRR | Lower CER = more accurate system overall |
> There is an inherent trade-off: tightening a biometric system to lower FAR will raise FRR, and vice versa. CER is the equalizing benchmark.
One-Time Password (OTP) Types
| Type | Basis | Validity |
|------|-------|---------|
| TOTP (Time-based OTP) | Current time + shared secret | Expires after a short window (e.g., 30 seconds) |
| HOTP (HMAC-based OTP) | Counter + shared secret | Valid until it is used (counter increments on use) |
Modern Authentication Methods
Key Terms
⚠️ Watch Out For
---
Access Control Models
Summary
Access control models define the rules by which subjects (users) are granted access to objects (resources). Each model has different administrative characteristics, flexibility, and appropriate use cases. The Security+ exam frequently tests your ability to identify the correct model from a scenario.
The Four Core Models
| Model | Who Controls Access | Key Characteristic |
|-------|--------------------|--------------------|
| MAC (Mandatory Access Control) | OS / Security Admin | Labels & clearance levels; users cannot override |
| DAC (Discretionary Access Control) | Resource Owner | Owner decides permissions; flexible but risky |
| RBAC (Role-Based Access Control) | Admin assigns roles | Permissions tied to job roles, not individuals |
| ABAC (Attribute-Based Access Control) | Policy engine | Access based on multiple attributes (user, resource, environment) |
Model Deep Dives
#### Mandatory Access Control (MAC)
#### Discretionary Access Control (DAC)
#### Role-Based Access Control (RBAC)
#### Attribute-Based Access Control (ABAC)
Supporting Principles
#### Principle of Least Privilege
> Users should be granted only the minimum access required to perform their job functions.
#### Privilege Creep
Key Terms
⚠️ Watch Out For
---
Identity Management
Summary
Identity management encompasses the tools, processes, and policies used to create, maintain, and retire digital identities across an organization. This includes directory services, account types, onboarding procedures, and the specialized management of privileged accounts.
Directory Services
Account Types
| Account Type | Description | Key Consideration |
|-------------|-------------|-------------------|
| User Account | Assigned to a human; used for interactive login | Subject to password policies and MFA |
| Service Account | Non-interactive; used by applications/services | Should have limited privileges; often targeted by attackers |
| Administrator/Root | Elevated privileges for system management | Should be used only when necessary |
| Guest Account | Limited access for temporary users | Should be disabled when not needed |
Identity Proofing
Privileged Account Security
#### Privileged Access Workstation (PAW)
#### Privileged Access Management (PAM)
Key Terms
⚠️ Watch Out For
---
Federation & Single Sign-On (SSO)
Summary
Federation and SSO allow users to authenticate once and access multiple systems or partner organizations without re-authenticating. This section covers the major protocols — SAML, OAuth 2.0, OIDC, and Kerberos — and associated attack techniques. Understanding which protocol does what is critical for the exam.
Federated Identity Management
Key Roles in Federation
| Role | Full Name | Function |
|------|-----------|---------|
| IdP | Identity Provider | Authenticates the user; issues security assertions/tokens |
| SP | Service Provider | Trusts the IdP assertion; grants access to its resources |
Protocol Comparison
| Protocol | Purpose | Format/Transport | Key Notes |
|----------|---------|-----------------|-----------|
| SAML 2.0 | Authentication & Authorization | XML assertions over HTTP redirects | Common for enterprise/web SSO; IdP-to-SP federation |
| OAuth 2.0 | Authorization (delegated access) | JSON tokens over HTTPS | Allows apps to access resources on behalf of a user; does NOT authenticate |
| OIDC | Authentication (built on OAuth 2.0) | JWT (ID Token) | Adds identity layer to OAuth 2.0; provides user claims |
| Kerberos | Network Authentication | Symmetric-key tickets | Used in Windows AD environments; KDC issues TGTs |
SAML Deep Dive
OAuth 2.0 vs. OpenID Connect (OIDC)
- Issues an access token to access resources
- Does NOT verify who the user is
- Adds an ID token (JWT) on top of OAuth 2.0
- Contains user identity claims (name, email, etc.)
> Memory aid: OAuth = Access (car keys); OIDC = Identity (driver's license)
Kerberos
- KDC (Key Distribution Center) — Central authentication server
- AS (Authentication Server) — Issues the TGT (Ticket Granting Ticket) after initial login
- TGS (Ticket Granting Service) — Issues service tickets using the TGT
- Service Ticket — Presented to a specific resource server for access
#### Kerberos Authentication Flow
```
User → AS: Request TGT (with credentials)
AS → User: Issues TGT (encrypted)
User → TGS: Request Service Ticket (using TGT)
TGS → User: Issues Service Ticket
User → Resource: Presents Service Ticket → Access Granted
```
Kerberoasting Attack
Key Terms
⚠️ Watch Out For
---
Account & Credential Management
Summary
Proper account and credential management policies are the operational backbone of IAM. This section covers the policies and tools used to protect credentials, prevent unauthorized access, and maintain the integrity of the account lifecycle.
Authentication vs. Authorization (Revisited)
| Concept | Question Answered | Example |
|---------|------------------|---------|
| Authentication | Who are you? | Logging in with username + password + MFA |
| Authorization | What can you do? | Reading files but not deleting them |
> These two concepts are frequently tested together. Authentication always precedes authorization.
Account Lockout Policies
- Lockout threshold — Number of failed attempts before lockout (e.g., 5)
- Lockout duration — How long the account remains locked
- Observation window — Time period during which failed attempts are counted
Password Attack Comparison
| Attack Type | Method | Target | Avoids Lockout? |
|------------|--------|--------|----------------|
| Brute Force | Tries many passwords against one account | Single account | No — triggers lockout |
| Password Spraying | Tries a few common passwords against many accounts | Many accounts | Yes — stays below lockout threshold per account |
| Credential Stuffing | Uses breached username/password pairs | Multiple accounts | Depends on