Authentication & Authorization
It’s not just Who You Are that matters.
It is What You Are that matters, too.
CyberSolve implements capabilities for your organization to properly authenticate entities and grant them only the needed authorization to access your systems, data, and applications. Proper Authentication will control the point of access while well planned Authorization will enforce the rules of what can be done post the granting of access.
The process of Authentication requires a subject successfully providing valid credentials to satisfy the access requirements of an application, service, or system to which the subject is trying to access. The addition of single sign-on (SSO) technologies allow for the centralization and/or the reduction of these authentication mechanisms in such a manner that multiple applications, services, and systems may rely on a central store for authentication or provides for synchronization of a subject’s credentials in order to limit the number of credentials per user, thus improving the end-user experience. Multi-Factor Authentication (MFA) should be considered to additionally secure assets through the requirement to provide two or more verification factors to gain access to a resource (often online applications, elevated privilege account accesses, VPNs, and/or mission critical services and systems).
As an access control, Information Technology systems and applications typically have their own implementation for authorization management or allow for the utilization of a centralized management engine (such as Azure or on-premises Active Directory (AD) Groups). This means that a user or entity has an account for each system/application used and each system/application has its own permission structure and method of permission assignment.