Translate

Sunday, 14 December 2025

AAA (Triple A) in IAM 02

 Here is a clear explanation of AAA (Triple A) in IAM, broken down with simple concepts and examples suitable for your tech tutorials.


AAA (Triple A) in IAM in vlrtraining


What is AAA?

AAA is the security framework that controls how people interact with a network or system. It stands for:

  1. Authentication (AuthN): Who are you?

  2. Authorization (AuthZ): What are you allowed to do?

  3. Accounting: What did you do?


1. Authentication (AuthN)

  • Definition: The process of verifying a user's identity. The system checks if the person is truly who they claim to be.

  • Common Methods:

    • Something you know: Password, PIN.

    • Something you have: Smart card, Phone (OTP).

    • Something you are: Fingerprint, FaceID (Biometrics).

2. Authorization (AuthZ)

  • Definition: Once the user is authenticated, the system determines what resources they can access and what operations they can perform.

  • Key Concept: Just because you are inside the building (Authenticated) doesn't mean you can enter the CEO's office (Authorization).

3. Accounting

  • Definition: This tracks the user's activity while they are on the network. It records the session duration, what services were accessed, and what changes were made.

  • Purpose: Used for security auditing, billing (in cloud), and reporting.


Real-World Example: A Hotel Stay

Imagine checking into a luxury hotel.

  1. Authentication ( The Reception Desk):

    • You arrive at the front desk. You show your ID and Credit Card.

    • The receptionist confirms, "Yes, this is Mr. John."

    • Result: You are Authenticated.

  2. Authorization (The Key Card):

    • The receptionist gives you a Key Card.

    • This card allows you to open Room 305 and the Gym.

    • It does not allow you to open the Penthouse Suite or the Kitchen.

    • Result: Your permissions are set. This is Authorization.

  3. Accounting (The Bill):

    • When you check out, the hotel gives you a bill.

    • "Ordered Room Service at 9 PM."

    • "Watched a paid movie at 10 PM."

    • "Opened the Mini-bar at 11 PM."

    • Result: The hotel tracked your usage. This is Accounting.


Technical Example: An Employee using AWS

Imagine a Data Engineer logging into the company cloud.

  1. Authentication:

    • The engineer goes to the AWS login page.

    • Enters Username + Password + MFA Code from their phone.

    • AWS says: "Login Successful."

  2. Authorization:

    • The engineer tries to access the S3 Bucket (File storage). -> Access Granted.

    • The engineer tries to delete a Production Database. -> Access Denied.

    • (IAM Policies determine that they can read data, but cannot delete databases).

  3. Accounting:

    • The security team looks at the CloudTrail Logs (Audit logs) the next day.

    • The log shows: "User 'DataEng1' downloaded 'Confidential_Report.pdf' at 2:00 PM."

    • If that file leaks, they know exactly who downloaded it.


Summary Table for Quick Reference

AAA ComponentThe Question it AnswersThe Action
AuthenticationWho are you?Checking ID / Password
AuthorizationWhat can you do?Checking Permissions / Policies
AccountingWhat did you do?Logging / Auditing / Monitoring

No comments:

Post a Comment

Note: only a member of this blog may post a comment.