CISSP Domain 5 Review / Mind Map (2 of 2) | Single Sign-on and Federated Identity Management

preview_player
Показать описание
Review of the major Single Sign-on and Federated Identity Management (FIM) concepts and terms, and how they interrelate, to help you review, guide your studies, and help you pass the CISSP exam.

This MindMap review covers:
0:00 Introduction
0:28 Single Sign-on / Federated Access
0:48 Single Sign-on
0:54 Kerberos
1:01 Components of Kerberos
1:07 User / Client
1:15 Key Distribution Center
1:27 Authentication Service
1:33 Ticket Granting Service
1:44 Service Tickets
1:52 Service
1:14 Sesame
2;34 Federated Identity Management (FIM)
3:01 Trust Relationship in Federated Access
3:37 SAML
4:08 Components of SAML
4:20 Profile
4:28 Bindings
4:37 Protocol
4:43 Assertion
4:50 Federated Access Protocols
5:12 IDaaS Identities
5:27 Cloud Identity
5:33 Synched Identity
5:49 Linked Identity
6:03 Federated Identity
6:17 Outro

Other MindMaps:

Domain 1

Domain 2

Domain 3

Domain 5

Domain 6

Domain 7

Domain 8

Рекомендации по теме
Комментарии
Автор

This is a MUST to use resource for anyone preparing for CISSP.
The way Rob speaks was very clear and very easy to follow.
I liked the Visuals and were truly helpful to create a map in mind for each topic.

I used these maps after finishing the OSG and Destination CISSP Book.
Though this is Free, they did not compromise on quality of content.

I cleared my CISSP on May 2023. Thank you very much for making that happen.

raghavendrankr
Автор

Outstanding stuff. I'm an Army lawyer that teaches other Army lawyers about cyber. You're schooling me on schooling. Nice.

philliplowry
Автор

Can't imagine how much more amazing it will be when there are other Destination (insert cert here) series! Thanks for these!

playfulsteps
Автор

Simple as drinking water

You are perfect to summarize this domain

aymanhout
Автор

one terrible password coming up! thanks for the video!

svb
Автор

love it. Ur gonna be famous on youtube. Of that, I am certain.

klaushu
Автор

Very useful vidio, it covers everything in a short note, very helpful to recap entire subject from short video, thanks

rehmanshaikh
Автор

Thank you for your great video. Once watching one of your video, I could sense quality and the value of your videos. I could sense level of your understanding on all those topics. Very well done and I am going to watching your videos again and again until they are instilled in my mind.

SmileyxMillie
Автор

Thank you to all three of you this video and others in the series. I was listening to this last night when I took a break from my study. At 5:31 I had to go several times to check on my kids. Then realized it was not mine, someone else's LOL. Good day.

cyberdk
Автор

Nice Video, well organized, help me understand the whole picture. Thank you so much!

haitaowang
Автор

thanks for the excellent summary. can you please explain where does office 365 or OKTA fit in this diagram? Are these considered as FIM solutions? I mean if we use our org credentials to access office 365 then are we using SAML?

charantejamuddam
Автор

Great video! Haven't gotten through your other videos, but are you planning on doing anything specifically around attacks or vulnerabilities of these different protocols?

zstpierre
Автор

its really help for learning the concepts, thanks a lot.

dudeshang
Автор

Amazing video series...Love it.. Thank you

sijuta
Автор

I am hooked on to your videos. I know new CISSP test has Kerberos and your video says you are working on it and will give a link. Just wondering if you are done?

tijarefamily
Автор

do we need to known openID and oauth in detail. Please suggest.

vmanan
Автор

Me after watching one of your videos....I know kung-fu

tulpapainting