Identity-Aware Networking

Identity-Aware Networking

Cover

When you think about identity management, what comes to mind? Probably things like LDAP directories, strong authentication, and Single Sign-On (SSO) systems. In general, these technologies are used for access to Windows networks, e-mail, and other internal applications. Of course, network pipes provide the actual infrastructure for these application layer communications, but network identity is far more elementary than application-layer activity. Generally, network identity is associated with things like IP and MAC addresses, VLAN tags, and subnets. It also plays a role in security in areas like device authentication, VPNs, and IPSEC.

Vendor:
Extreme Networks
Posted:
02 Dec 2010
Published:
02 Dec 2010
Format:
PDF
Length:
8 Page(s)
Type:
White Paper
Language:
English
Already a Bitpipe member? Login here

Download this White Paper!

By submitting your personal information, you agree to receive emails regarding relevant products and special offers from TechTarget and its partners. You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.