sponsored by Oracle Corporation
Posted:  13 Jun 2011
Published:  10 Jun 2011
Format:  PDF
Length:  14  Page(s)
Type:  White Paper
Language:  English

As the number and type of users who require access to organizations’ computer-based resources continues to climb; the traditional method of managing user access on a case-by-case basis has quickly become antiquated. Defining user roles as a way to manage access to computer-based systems is an efficient, effective alternative to managing access on a user-by-user basis—which can be virtually impossible when dealing with large numbers of dynamic users. This white paper explores a seven-step process which has proven to be an effective method for administrators to identify user roles for access control.

Access Control | Access Control Software | Access Rights | Identity Management | Security Management | Security Policies

View All Resources sponsored by Oracle Corporation

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement