Search This Blog

Wednesday, May 11, 2016

After authentication comes authorization and access control

In our first post in this series, we talked about authentication: verifying whether someone is who he or she claims to be. In many instances, this is where system administrators call it a day, by giving all verified users equal access to network resources. But there is much to be gained by continuing to apply the other three As of Account Management. In this post we’ll talk about authorization and access control – what are they, and in what scenarios could you use them to improve your security?



After authentication comes authorization and access control

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.