exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 10 discussion

Actual exam question from CompTIA's CAS-004
Question #: 10
Topic #: 1
[All CAS-004 Questions]

An organization is implementing a new identity and access management architecture with the following objectives:
✑ Supporting MFA against on-premises infrastructure
✑ Improving the user experience by integrating with SaaS applications
✑ Applying risk-based policies based on location
✑ Performing just-in-time provisioning
Which of the following authentication protocols should the organization implement to support these requirements?

  • A. Kerberos and TACACS
  • B. SAML and RADIUS
  • C. OAuth and OpenID
  • D. OTP and 802.1X
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Pongpisit
Highly Voted 3 years, 5 months ago
Selected Answer: B
SAML and RADIUS
upvoted 20 times
AenAllAin
3 years, 4 months ago
I don't see how the answer could not be B... 1. The cited reference just points to an Azure AD manual. 2. JIT Provisioning uses SAML. 3. RADIUS is a true AAA; whereas, TACACS did not separate the AAA functionality until XTACACS and TACACS+. 4. Windows services tie you to Kerberos in their stack, but not all SaaS are Windows based. ...maybe I'm wrong
upvoted 8 times
...
...
AlexJacobson
Highly Voted 2 years, 11 months ago
Selected Answer: B
Definitely SAML and RADIUS (SAML because of just-in-time, and RADIUS because of AAA)
upvoted 8 times
...
lionleo
Most Recent 2 weeks, 5 days ago
Selected Answer: C
Improving the user experience by integrating with SaaS applications: OAuth 2.0 is the standard for securing access to APIs and integrates seamlessly with SaaS applications. OpenID Connect (OIDC) is an extension of OAuth 2.0 that provides identity verification and enables Single Sign-On (SSO) for a better user experience when accessing cloud-based services.
upvoted 1 times
...
Bluedegard2_111
3 weeks, 5 days ago
Selected Answer: B
JIT as well as UX integration can be found in SSO such as SAML, OAuth, or OpenID. However, authentication against on-premises and risk-based policies based on location implies the "Remote Working" that mean either RADIUS or TACACS are candidate. So, the final answer should be B. SAML and RADIUS
upvoted 1 times
...
Bright07
4 months, 3 weeks ago
Selected Answer: C
C is the right answer no doubt
upvoted 2 times
...
blacksheep6r
4 months, 3 weeks ago
Selected Answer: B
let's break down why B. SAML and RADIUS is the best choice: RADIUS: This protocol is commonly used to support MFA (multi-factor authentication) for on-premises systems. It helps in authenticating users at the network level, which is ideal for securing access to on-prem infrastructure. SAML: Security Assertion Markup Language (SAML) is widely adopted for federated identity management, making it a strong choice for integrating with SaaS applications. It also supports just-in-time (JIT) provisioning, where user accounts are created on the fly based on SAML assertions. Additionally, SAML-based systems can incorporate risk-based policies (like location-based controls) through the identity provider's configuration.
upvoted 1 times
...
Chiaretta
5 months ago
Selected Answer: C
C is the right answer.
upvoted 3 times
...
Bright07
6 months ago
Selected Answer: C
Ans is C. To meet the requirements for supporting MFA, integrating with SaaS applications, applying risk-based policies, and performing just-in-time provisioning, the best choice from the options provided would be: C. OAuth and OpenID OAuth: This protocol is commonly used for authorization in SaaS applications and allows for seamless integration with third-party services. It also supports just-in-time provisioning by allowing access tokens to be generated dynamically. OpenID: This protocol is used for authentication and can enhance user experience by providing a way to log in to multiple applications with a single identity. It also supports MFA, which is crucial for your requirements. Whereas SAML and RADIUS: SAML is good for federated authentication and works well with SaaS, but RADIUS is more focused on network access control and may not support all aspects of your requirements as comprehensively. So, OAuth and OpenID is the most suitable choice.
upvoted 3 times
...
Bright07
8 months, 1 week ago
Ans is C. To meet the requirements for supporting MFA, integrating with SaaS applications, applying risk-based policies, and performing just-in-time provisioning, the best choice from the options provided would be: C. OAuth and OpenID OAuth: This protocol is commonly used for authorization in SaaS applications and allows for seamless integration with third-party services. It also supports just-in-time provisioning by allowing access tokens to be generated dynamically. OpenID: This protocol is used for authentication and can enhance user experience by providing a way to log in to multiple applications with a single identity. It also supports MFA, which is crucial for your requirements. Whereas SAML and RADIUS: SAML is good for federated authentication and works well with SaaS, but RADIUS is more focused on network access control and may not support all aspects of your requirements as comprehensively. So, OAuth and OpenID is the most suitable choice.
upvoted 3 times
...
IT_Master_Tech
8 months, 2 weeks ago
ChatGPT goes with C.
upvoted 3 times
...
salmonIsDecent
9 months, 1 week ago
Selected Answer: C
C. OAuth and OpenID Reasoning: OAuth and OpenID Connect are widely used for SaaS integrations, JIT provisioning, MFA, and applying risk-based policies. This combination fits the organization's needs most comprehensively.
upvoted 3 times
...
surfuganda
9 months, 1 week ago
Selected Answer: C
A. Kerberos and TACACS: [INCORRECT] Kerberos for on-premises auth within a domain but doesn't directly support integration with SaaS . TACACS doesn't support SaaS applications or risk-based policies based on location. B. SAML and RADIUS: [INCORRECT] SAML supports SSO, integrating with SaaS applications and applying risk-based policies based on location. RADIUS is used for NAC but doesn't directly support integration with SaaS applications. SAML aligns with the objectives, but RADIUS doesn't . C. OAuth and OpenID: [CORRECT] OAuth can grant access to resources, including SaaS applications, and can be used for MFA. OpenID provides SSO and user authentication, supports risk-based policies and just-in-time provisioning. D. OTP and 802.1X: [INCORRECT] OTP supports MFA, but is not ideal for integrating with SaaS applications or just-in-time provisioning. 802.1X is used for network access control and doesn't directly support the objectives.
upvoted 5 times
...
HereToStudy
10 months ago
Selected Answer: B
It’s B
upvoted 1 times
...
23169fd
11 months, 3 weeks ago
Selected Answer: B
OAuth and OpenID Connect are excellent for modern, web-based authentication scenarios, especially for integrating with SaaS applications and providing seamless SSO. However, OAuth and OpenID Connect do not inherently support MFA for on-premises infrastructure. They are more geared towards web and mobile applications and may require additional components to fully support MFA and risk-based policies for on-premises systems.
upvoted 6 times
...
Remmmie
1 year, 4 months ago
Selected Answer: C
Oauth and OpenID
upvoted 5 times
...
ElDirec
1 year, 4 months ago
Selected Answer: C
C. OAuth and OpenID OAuth (Open Authorization) and OpenID are modern, open-standard protocols that provide secure delegated access. They’re widely used for single sign-on (SSO) and identity federation. OAuth is a protocol that allows an application to authenticate against a server as a user, without requiring passwords or tokens to be passed to the application itself. This is particularly useful for SaaS applications. OpenID Connect (an extension of OAuth) is a protocol that allows clients to verify the identity of an end-user based on the authentication performed by an authorization server. Both OAuth and OpenID support just-in-time provisioning, which is the ability to create a user account within an application at the time of authentication2.
upvoted 4 times
...
Kabbath1986
1 year, 5 months ago
Selected Answer: C
C. OAuth and OpenID Explanation: OAuth (Open Authorization) is commonly used for authorization and delegated access. It is suitable for scenarios where a user wants to grant a third-party application limited access to their resources without sharing their credentials. OAuth is often used in conjunction with OpenID Connect (OIDC) for authentication. OpenID Connect (OIDC) is an identity layer built on top of OAuth 2.0. It provides an authentication layer, allowing clients to verify the identity of end-users based on the authentication performed by an authorization server.
upvoted 5 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...