sponsored by Dell Software
Posted:  02 Oct 2009
Published:  02 Oct 2009
Format:  PDF
Length:  18  Page(s)
Type:  White Paper
Language:  English
ABSTRACT:
Access control in a Microsoft-centric environment presents special challenges. While identity and authentication is highly centralized, authorization is widely distributed and implemented differently with each type of resource. For example, you may have very advanced identity management and centralized authentication through Active Directory (AD) and you can base an employee's access to a wide variety of resources across the network with a single user account in AD. However, the user's permissions to those resources are scattered throughout the network and are stored and managed locally with each resource.

Therefore, in a Microsoft-centric environment, it is very easy to locate users and update their identity information or account status, but assessing and controlling what resources that user is permitted to access is complex and error-prone.

This tech brief presents eight recommendations to help you proactively address the difficulties of access control in a Microsoft-centric environment, and avoid the common pitfalls, risks and costs.






BROWSE RELATED RESOURCES
Access Control | Access Control Software | Active Directory | Authentication | Authorization | Database Security | File Server Software | Identity Management | IT Management | Password Authentication Protocol | Password Management

View All Resources sponsored by Dell Software

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement