With a federated identity system, where would a user perform their authentication when requesting services or application access?
Click on the arrows to vote for the correct answer
A. B. C. D.C.
With a federated identity system, a user will perform authentication with their home organization, and the application will accept the authentication tokens and user information from the identity provider in order to grant access.
The purpose of a federated system is to allow users to authenticate from their home organization.
Therefore, using the application or a third-party authentication system would be contrary to the purpose of a federated system because it necessitates the creation of additional accounts.
The use of a cloud provider would not be relevant to the operations of a federated system.
In a federated identity system, a user would perform their authentication with their home organization when requesting services or application access.
Federated identity management (FIM) is an approach to identity and access management (IAM) that enables multiple organizations to share digital identity information securely across different systems and platforms. FIM allows users to use a single set of login credentials (such as username and password) to access multiple systems and applications that belong to different organizations.
In a federated identity system, the user's home organization is responsible for authenticating the user and providing the necessary identity information to the service provider. When the user requests access to a service or application, the service provider sends the user's authentication request to the user's home organization's identity provider (IdP). The IdP then authenticates the user and provides the necessary identity information to the service provider.
Therefore, the correct answer to the question is C. The user would perform their authentication with their home organization in a federated identity system when requesting services or application access. The cloud provider, the application, or a third-party authentication system would not be responsible for user authentication in this scenario.