Introduction to Authentication Protocols
Available in:
Education Category Image


  
Introduction to Authentication Protocols
Duration: 4 hours
AS404W : AS404W
This introductory course provides a foundational understanding of the most widely used authentication protocols in modern digital security and in SAS Viya too: OpenID Connect, OAuth, Kerberos, and SAML. Designed for beginners, it covers the essential concepts, components, and workflows behind each protocol, explaining how they enable secure access and identity verification in digital environments.
Learn How To
  • Understand the details of Kerberos authentication protocol.
  • Understand the details of OpenID Connect authentication protocol.
  • Understand the details of SAML authentication protocol.
  • Who Should Attend
    Students who want a deeper understanding of modern authentication protocols
    Prerequisites
    Before attending this course, you need only an interest in understanding different authentication protocols.
    SAS Products Covered
    SAS Viya
    Course Outline
    Kerberos Core Concepts
  • Key terms.
  • Key considerations.
  • Kerberos components.
  • Kerberos Phase 1 initial authentication.
  • Kerberos Phase 2 authentication to a service.
  • Kerberos delegated authentication.
  • Kerberos Cross-Realm authentication.
  • Kerberos prerequisites.
  • Kerberos encryption mechanisms.
  • Kerberos in Windows.
  • Kerberos in Unix.
  • MIT Kerberos.
  • Kerberos KVNO.
  • Constrained delegation key terms.
  • Constrained delegation key considerations.
  • S4U2SELF.
  • S4U2PROXY.
  • Constrained delegation requirements.
  • Setting constrained delegation using the GUI.
  • Setting constrained delegation using PowerShell.
  • Resource-based constrained delegation settings.
  • OpenID Connect Core Concepts
  • Examples.
  • Key terms.
  • Key considerations.
  • OAuth 2.0 components.
  • OpenID connect components.
  • OAuth 2.0 authorization process.
  • OpenID connect authentication process.
  • OAuth 2.0 OpenID connect requirements.
  • Protocol endpoints.
  • Client registration.
  • Client authentication.
  • Token details.
  • OAuth grant types.
  • Claim details.
  • SAML Core Concepts
  • Examples.
  • Key terms.
  • Key considerations.
  • SAML 2.0 components.
  • SAML 2.0 authentication process.
  • SAML 2.0 requirements.
  • SAML assertions details.
  • SAML name identifier types details.
  • SAML signing and encryption details.
  • SAML AuthnRequest details.
  • Detailed flow diagrams.
  • SAML assertions specification.
  • SAML protocol details.
  • THIS COURSE IS PART OF

    SAS Architecture and Security Learning Subscription



    Skip Earn this badge

    Earn this badge

    Badge Image