Information Technology Reference
In-Depth Information
security policy, such as token expiration, authentication throttling, and very
high levels of cryptographic strength.
Some typical IAM-specific security requirements are listed in Appendix A,
along with suggestions on how a LIMA-based system can support them.
In short, implementing IAM "on a shoestring" does not mean cutting corners
on security. Far from it. Security is extremely important, as we will
emphasise again and again. However, you should not allow anyone to use
security as a bogeyman to scare you into paying much more for IAM than
you really need to.
That's what this document is about.
Search WWH ::




Custom Search