AAA and IAM Concepts

Key Takeaways

  • AAA separates authentication, authorization, and accounting; do not blend the three in scenario questions.
  • IAM controls the full identity lifecycle: provisioning, proofing, access assignment, review, change, and deprovisioning.
  • Federation lets one organization trust identity assertions from another identity provider.
  • SSO improves user experience but raises the value of the identity provider and session controls.
  • Accounting requires useful logs, time synchronization, retention, and review.
Last updated: April 2026

AAA and IAM Concepts

Identity questions usually test the order of operations. A user first claims an identity, then proves it, then receives access, and later the organization can show what happened.

TermWhat it answersExample clue
IdentificationWho are you claiming to be?Username, employee ID, certificate subject
AuthenticationCan you prove that identity?Password, FIDO2 key, smart card, biometric
AuthorizationWhat are you allowed to do?Group membership, role assignment, policy decision
AccountingWhat did you do?Login record, admin command log, audit trail

IAM Lifecycle

PhaseSecurity goalCommon control
Identity proofingBind the account to the correct person or workloadHR record, document check, device attestation
ProvisioningCreate the right account with the right accessJoiner workflow, group assignment, default deny
MaintenanceKeep access current as work changesMover workflow, access review, recertification
DeprovisioningRemove access when no longer neededLeaver workflow, account disablement, token revocation
MonitoringDetect abuse or driftSIEM alerts, UEBA, privileged session recording

Federation, SSO, and Directory Services

Federation means one domain accepts identity assertions from another. A company might let employees sign in to a cloud SaaS platform using the company identity provider. The SaaS app is not storing the employee password; it trusts a signed assertion or token from the identity provider.

ConceptExam-useful descriptionWatch for
Directory serviceCentral store for users, groups, devices, and attributesLDAP, Active Directory, identity directory
SSOOne authentication event allows access to multiple servicesConvenience plus higher impact if the session is stolen
FederationTrust relationship across organizations or security domainsIdP, service provider, SAML, OIDC
ProvisioningCreating and updating accounts and entitlementsSCIM, HR-driven joiner/mover/leaver flow
DeprovisioningRemoving access quickly and completelyDisable account, revoke tokens, remove groups

Trap Callout: SSO Does Not Mean Same Password Everywhere

SSO should reduce password sprawl. If every app has the same password manually configured, that is password reuse, not true SSO. In true SSO, applications rely on the identity provider and receive a token, assertion, or session result.

Scenario Walkthrough

A sales employee transfers to finance. The old CRM role remains active, the new finance role is added, and no one reviews the combined access. The weakness is not authentication; the user may still log in correctly. The problem is authorization drift. The best response is a mover workflow with access review, removal of the old role, least privilege, and logging.

Quick Drill

ScenarioBest answer
Need proof that an admin changed a firewall ruleAccounting
Need one login for many cloud appsSSO through an identity provider
Need a SaaS app to trust corporate loginFederation
Need automatic account removal after terminationDeprovisioning
Need to prevent old permissions after a job transferRecertification or mover workflow
Test Your Knowledge

A terminated contractor can still access a project management SaaS app because the account was never disabled. Which IAM lifecycle control failed?

A
B
C
D
Test Your Knowledge

A user signs in to the corporate identity provider and then accesses several cloud applications without separate passwords for each app. Which concept is most directly shown?

A
B
C
D
Test Your KnowledgeMulti-Select

Which items are part of accounting in AAA? Choose two.

Select all that apply

Audit logs
Session records
Password length
Biometric enrollment