Understand provisioning, SSO, MFA, privileged access, and operational IAM decisions for Security+.
Security+ moves identity into operations because access control is a daily workflow problem, not just a design principle. The exam wants you to understand user lifecycle, authentication strength, privileged access discipline, and how SSO and federation reduce friction without expanding trust too far.
SSO: Single sign-on, where one approved identity session is reused across multiple applications or services.
Federation: A trust arrangement that lets one identity system authenticate users for another system or service.
MFA: Multi-factor authentication, which requires more than one independent proof of identity.
CompTIA is usually checking whether you can separate:
That is why the best answer often sounds slightly less convenient than the distractor. Strong IAM operations reduce standing privilege and make account state easier to govern.
| Requirement | Strongest first idea |
|---|---|
| New user access | formal provisioning tied to role and approval |
| Faster sign-in across services | SSO with centralized identity |
| Stronger sign-in assurance | MFA with phishing-resistant or stronger factors where appropriate |
| Admin access control | privileged access tools, least privilege, logging, JIT or PAM-style controls |
flowchart LR
A["Joiner"] --> B["Provision approved access"]
B --> C["Role change review"]
C --> D["Periodic access review"]
D --> E["Deprovision on exit"]
What to notice:
CompTIA’s objective group includes:
The exam often asks for the control that both strengthens security and improves operational control. Centralized identity frequently beats local account sprawl.
| Requirement | Strongest first fit | Why |
|---|---|---|
| One user identity across many applications | SSO | Reduces account sprawl and centralizes sign-in |
| Third-party application needs delegated access | OAuth 2.0 style delegation | Supports scoped access on the user’s behalf |
| Centralized enterprise login to cloud or SaaS apps | Federation plus MFA | Keeps identity governance centralized |
| High-risk admin tasks | Privileged access management style controls, just-in-time access, session logging | Reduces standing privilege and improves accountability |
1user: achen
2role: finance-analyst
3access:
4 - payroll-read
5 - expense-report-submit
6mfa: required
7review_date: 2026-06-30
What to notice:
A contractor needs administrative access to a sensitive environment for one weekend migration. The organization wants to preserve accountability and avoid keeping that level of access active afterward. Which option is strongest?
A. Share the team’s existing admin account so the work is simpler
B. Grant the contractor permanent admin rights and review them next quarter
C. Use an individually assigned account with strong authentication and time-bound privileged access that can be removed after the migration
D. Disable logging to reduce noise during the change
Best answer: C. The strongest answer preserves identity accountability, strong authentication, and a narrow privilege window instead of creating standing access.
Continue with 4.7 Automation & Orchestration to see how operational identity and control workflows can be applied consistently at scale.