Information Technology Reference
In-Depth Information
Chapter 5
Managing Identity
In This Chapter
• An examination of the options for access authentication
• Considerations for access control planning
• Implications of directory service integration across the enterprise
In William Shakespeare's classic tragedy, Juliet asks of Romeo, “What's
in a name? That which we call a rose / By any other name would smell
as sweet.” Her question concerns the feud between the two families that
keeps the lovers apart, but it bears another, important meaning in terms
of enterprise architectural planning today. Juliet poses the question of
fundamental identity: What makes a rose a rose, and not something else?
Certainly, the name alone does not define all of the qualities that make
roses desirable.
Within the network enterprise, the issue of identity is fundamental to
access and security. Without the basic requirement of unique identifica-
tion, accountability and access control measures cannot be implemented.
We will examine the process of identification, authentication, and autho-
rization as they apply to the process of identity management. Identity
management will play an important role in later chapters, where data
91
 
 
Search WWH ::




Custom Search