An organization is implementing a new identity and access management architecture with the following objectives: -> Supporting MFA against on-premises infrastructure -> Improving the user experience by integrating with SaaS applications -> Applying risk-based policies based on location -> Performing just-in-time provisioning Which of the following authentication protocols should the organization implement to support these requirements?
Click on the arrows to vote for the correct answer
A. B. C. D.A.
https://docs.microsoft.com/en-us/azure/active-directory/manage-apps/migrate-application-authentication-to-azure-active-directoryBased on the given objectives, the authentication protocols that the organization should implement are:
B. SAML and RADIUS
Here is the explanation for each protocol:
SAML (Security Assertion Markup Language): SAML is an XML-based protocol used for exchanging authentication and authorization data between parties, in particular, between an identity provider (IDP) and a service provider (SP). It allows users to authenticate with one service and access other services without having to authenticate again. SAML supports MFA and can integrate with SaaS applications, making it an appropriate choice for the first two objectives. It also supports risk-based policies based on location and just-in-time provisioning, making it a suitable choice for the other two objectives.
RADIUS (Remote Authentication Dial-In User Service): RADIUS is a client/server protocol that provides centralized authentication, authorization, and accounting (AAA) management for users who connect and use a network service. It can provide MFA for on-premises infrastructure, which meets the first objective. It can also support risk-based policies based on location by configuring different access policies for different users and groups based on their location. Additionally, RADIUS can perform just-in-time provisioning by adding or removing users from the RADIUS server's user database as needed, making it an appropriate choice for the fourth objective.
Therefore, option B, SAML and RADIUS, is the most appropriate answer for the given objectives.
Option A, Kerberos and TACACS, is not appropriate because Kerberos is primarily used for authentication within a Windows Active Directory domain, and TACACS is mainly used for network device access control. Neither protocol supports SaaS integration or just-in-time provisioning.
Option C, OAuth and OpenID, is not appropriate because OAuth is an authorization protocol used for granting access to resources, not for authentication. OpenID is an authentication protocol, but it is not designed to support risk-based policies based on location or just-in-time provisioning.
Option D, OTP and 802.1X, is not appropriate because OTP (One-Time Password) is a type of MFA, but it is not a protocol itself. It is used in combination with other protocols, such as RADIUS. 802.1X is a protocol used for port-based network access control and does not support SaaS integration or just-in-time provisioning.