Top Eight Do's and Don'ts of Managing Access Control in the Windows/AD Environment

Top Eight Do's and Don'ts of Managing Access Control in the Windows/AD Environment

Access control in a Microsoft-centric environment presents special challenges. While identity and authentication is highly centralized, authorization is widely distributed and implemented differently with each type of resource. For example, you may have very advanced identity management and centralized authentication through Active Directory (AD) and you can base an employee's access to a wide variety of resources across the network with a single user account in AD. However, the user's permissions to those resources are scattered throughout the network and are stored and managed locally with each resource.

Therefore, in a Microsoft-centric environment, it is very easy to locate users and update their identity information or account status, but assessing and controlling what resources that user is permitted to access is complex and error-prone.

This tech brief presents eight recommendations to help you proactively address the difficulties of access control in a Microsoft-centric environment, and avoid the common pitfalls, risks and costs.

Dell Software
02 Oct 2009
02 Oct 2009
18 Page(s)
White Paper
Already a Bitpipe member? Login here

Download this White Paper!

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.