Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam CAS-004 topic 1 question 10 discussion

Actual exam question from CompTIA's CAS-004
Question #: 10
Topic #: 1
[All CAS-004 Questions]

An organization is implementing a new identity and access management architecture with the following objectives:
✑ Supporting MFA against on-premises infrastructure
✑ Improving the user experience by integrating with SaaS applications
✑ Applying risk-based policies based on location
✑ Performing just-in-time provisioning
Which of the following authentication protocols should the organization implement to support these requirements?

  • A. Kerberos and TACACS
  • B. SAML and RADIUS
  • C. OAuth and OpenID
  • D. OTP and 802.1X
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/manage-apps/migrate-application-authentication-to-azure-active-directory

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Pongpisit
Highly Voted 2 years, 3 months ago
Selected Answer: B
SAML and RADIUS
upvoted 16 times
AenAllAin
2 years, 2 months ago
I don't see how the answer could not be B... 1. The cited reference just points to an Azure AD manual. 2. JIT Provisioning uses SAML. 3. RADIUS is a true AAA; whereas, TACACS did not separate the AAA functionality until XTACACS and TACACS+. 4. Windows services tie you to Kerberos in their stack, but not all SaaS are Windows based. ...maybe I'm wrong
upvoted 7 times
...
...
AlexJacobson
Highly Voted 1 year, 9 months ago
Selected Answer: B
Definitely SAML and RADIUS (SAML because of just-in-time, and RADIUS because of AAA)
upvoted 7 times
...
surfuganda
Most Recent 1 month ago
Selected Answer: C
A. Kerberos and TACACS: [INCORRECT] Kerberos for on-premises auth within a domain but doesn't directly support integration with SaaS . TACACS doesn't support SaaS applications or risk-based policies based on location. B. SAML and RADIUS: [INCORRECT] SAML supports SSO, integrating with SaaS applications and applying risk-based policies based on location. RADIUS is used for NAC but doesn't directly support integration with SaaS applications. SAML aligns with the objectives, but RADIUS doesn't . C. OAuth and OpenID: [CORRECT] OAuth can grant access to resources, including SaaS applications, and can be used for MFA. OpenID provides SSO and user authentication, supports risk-based policies and just-in-time provisioning. D. OTP and 802.1X: [INCORRECT] OTP supports MFA, but is not ideal for integrating with SaaS applications or just-in-time provisioning. 802.1X is used for network access control and doesn't directly support the objectives.
upvoted 1 times
...
Remmmie
2 months, 2 weeks ago
Selected Answer: C
Oauth and OpenID
upvoted 2 times
...
ElDirec
2 months, 3 weeks ago
Selected Answer: C
C. OAuth and OpenID OAuth (Open Authorization) and OpenID are modern, open-standard protocols that provide secure delegated access. They’re widely used for single sign-on (SSO) and identity federation. OAuth is a protocol that allows an application to authenticate against a server as a user, without requiring passwords or tokens to be passed to the application itself. This is particularly useful for SaaS applications. OpenID Connect (an extension of OAuth) is a protocol that allows clients to verify the identity of an end-user based on the authentication performed by an authorization server. Both OAuth and OpenID support just-in-time provisioning, which is the ability to create a user account within an application at the time of authentication2.
upvoted 2 times
...
Kabbath1986
3 months ago
Selected Answer: C
C. OAuth and OpenID Explanation: OAuth (Open Authorization) is commonly used for authorization and delegated access. It is suitable for scenarios where a user wants to grant a third-party application limited access to their resources without sharing their credentials. OAuth is often used in conjunction with OpenID Connect (OIDC) for authentication. OpenID Connect (OIDC) is an identity layer built on top of OAuth 2.0. It provides an authentication layer, allowing clients to verify the identity of end-users based on the authentication performed by an authorization server.
upvoted 2 times
...
Kabbath1986
3 months ago
Selected Answer: C
To support the specified objectives, the organization should implement the following authentication protocols: C. OAuth and OpenID Explanation: OAuth: OAuth is commonly used for delegated authorization and is suitable for integrating with SaaS applications. It allows secure access to resources without sharing the user's credentials. OpenID: OpenID is an authentication protocol that enables single sign-on (SSO) and is often used in conjunction with OAuth for user authentication. It is useful for improving the user experience by providing seamless access to multiple applications. This combination of OAuth and OpenID can help achieve multi-factor authentication (MFA), integrate with SaaS applications, and enhance the overall user experience.
upvoted 1 times
...
Delab202
3 months, 2 weeks ago
Selected Answer: C
The organization's objectives involve supporting multi-factor authentication (MFA), integrating with SaaS applications, applying risk-based policies, and performing just-in-time provisioning. The most suitable authentication protocols for these requirements are: C. OAuth and OpenID Explanation: OAuth (Open Authorization): OAuth is commonly used for authorization and enables secure API authorization flows, making it suitable for integrating with SaaS applications. It allows users to grant third-party applications limited access to their resources without sharing their credentials. OpenID: OpenID is an authentication protocol built on top of OAuth. It allows users to authenticate on one website and share their identity securely with other websites without the need to expose credentials. OpenID is beneficial for improving the user experience by enabling single sign-on (SSO) and supporting just-in-time provisioning.
upvoted 1 times
...
hb0011
4 months ago
Selected Answer: C
OAuth and OpenID
upvoted 2 times
...
jhxetc
4 months, 2 weeks ago
Selected Answer: C
You could make arguments for B, however C will be the correct answer on the test. The phrase "Identity and Access Management" aka IAM, is generally associated with OAuth, OIDC and SAML - but not RADIUS. Additionally, the requirement of SaaS integration would take RADIUS off of the table completely.
upvoted 2 times
Anarckii
4 months ago
I agree with this. Narrowed it down to the two choices as well and RADIUS threw me off. Figured authorization (oAuth) and Authentication (OpenID) would be the best choice
upvoted 1 times
...
...
OdinAtlasSteel
5 months, 2 weeks ago
Selected Answer: C
While B is a valid answer, the MOST correct answer is C. According to ChatGPT, OAuth/OpenID is considered a more versatile and modern solution.
upvoted 2 times
...
Toonce72
5 months, 2 weeks ago
Two popular authentication protocols for SaaS applications are OAuth and OpenID Connect (OIDC).
upvoted 2 times
...
Mr214
8 months, 2 weeks ago
Selected Answer: C
OAuth and OpenID is the only widely supported method for SaaS
upvoted 2 times
...
BiteSize
9 months, 1 week ago
Selected Answer: B
Source: Verifying each answer against Chat GPT, my experience, other test banks, a written book, and weighing in the discussion from all users to create a 100% accurate guide for myself before I take the exam. (It isn't easy because of the time needed, but it is doing my diligence)
upvoted 3 times
...
lifeblood12005
9 months, 2 weeks ago
The correct answer is: SAML and RADIUS
upvoted 2 times
...
fb2fcb1
9 months, 2 weeks ago
Selected Answer: C
C. OAuth and OpenID OAuth and OpenID Connect are the most suitable options to achieve these objectives: OAuth 2.0: It is an open-standard authorization protocol that allows third-party applications to access resources on behalf of a user without sharing their credentials. OAuth is widely used for granting permission to SaaS applications, supporting MFA, and implementing risk-based policies. OpenID Connect (OIDC): OIDC is a simple identity layer built on top of the OAuth 2.0 protocol, allowing clients to verify the identity of the end-user. It can be used for just-in-time provisioning. Kerberos, TACACS, and RADIUS are older protocols that lack direct support for SaaS integration and modern provisioning approaches. OTP is a type of MFA and 802.1X is a standard for network access control, both are not authentication protocols per se.
upvoted 3 times
...
louiedgr8
12 months ago
While OTP (One-Time Password) and 802.1X are valid authentication protocols, they may not be the best choice to meet the objectives listed in the question. While OTP can support MFA, it may not be the best choice for integrating with SaaS applications or performing just-in-time provisioning. While it can support risk-based policies based on location, it may not be the best choice for integrating with SaaS applications or improving the user experience. On the other hand, SAML and RADIUS are widely used protocols for enabling authentication and authorization for a wide range of scenarios, including cloud-based applications, VPN access, and wireless networks. They can support MFA, just-in-time provisioning, and risk-based policies based on location, while also improving the user experience by reducing the number of times users need to authenticate themselves.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...