We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
 
74,421 News Articles

Download the InfoWorld Authentication and Authorization Deep Dive report

Find out how to implement authentication and authorization security controls in your company, with help from InfoWorld's expert guide

The Internet works because of trust and access control. Trust that the person poking you on Facebook is really a friend. Trust that the bank that issued your credit card will let only you or authorized employees view your account. Even the anonymous parts of the Internet can't exist without security controls that enable people to determine who has access and what they can do. Without access controls, anyone can destroy the trust value of any website -- and bring it down.

In this 11-page PDF, InfoWorld contributing editor and security expert Roger Grimes offers a short course on the topic, including clear explanations of identity, access control, and the forensics of user activity, with a special section on the latest developments. This Deep Dive will show you how to apply authentication, authorization, and accounting to your business computing infrastructure -- the right way.

Learn More

Already an Insider? Sign in


IDG UK Sites

LG G3 release date, price, specs and new features 2014

IDG UK Sites

iPhone 5s review: why the iPhone 5s is still the best phone you can buy in 2014

IDG UK Sites

PCs vs consoles: PCs still pwn when it comes to gaming (and everything else)

IDG UK Sites

NAB 2014: Affordable 4K cameras, boundary-pushing plug-ins & drone domination