From the course: Complete Guide to Open Source Security

Unlock the full course today

Join today to access over 24,500 courses taught by industry experts.

Introduction to identities

Introduction to identities

- [Instructor] One of the fundamental security capabilities for an IT system is identity. This is used to establish ownership, access, and privileges for a user to a system, application, or data. With a unique identity, we can then attribute activity on a system and access to a resource, to a specific individual. We'll usually see the identity expressed as a user id. Of course, our systems also have identities, which are usually expressed as a host name or an IP address. Individual systems contain their own identity stores with Linux holding its users in the et cetera password file and Windows in the SAM. However, enterprises generally set up a separate identity store and externalize identity services on their workstations and servers. The external identity store is known as a directory, and the standard protocol for interacting with directories is the lightweight directory application protocol or LDAP. The most prevalent identity system in enterprise is Microsoft's Active Direectory.…

Contents