We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
80,258 News Articles

Download the InfoWorld Authentication and Authorization Deep Dive report

Find out how to implement authentication and authorization security controls in your company, with help from InfoWorld's expert guide

The Internet works because of trust and access control. Trust that the person poking you on Facebook is really a friend. Trust that the bank that issued your credit card will let only you or authorized employees view your account. Even the anonymous parts of the Internet can't exist without security controls that enable people to determine who has access and what they can do. Without access controls, anyone can destroy the trust value of any website -- and bring it down.

In this 11-page PDF, InfoWorld contributing editor and security expert Roger Grimes offers a short course on the topic, including clear explanations of identity, access control, and the forensics of user activity, with a special section on the latest developments. This Deep Dive will show you how to apply authentication, authorization, and accounting to your business computing infrastructure -- the right way.

Learn More

Already an Insider? Sign in


IDG UK Sites

5 reasons Facebook Messenger is terrible, and 5 reasons it's great

IDG UK Sites

Samsung: King of the Androids (or MWC, at least)

IDG UK Sites

Inside Microsoft's universal platform for designing apps that work on PCs, tablets, phones, Xbox...

IDG UK Sites

How to watch Apple's 9 March 'Spring Forward' Apple Watch event live stream, and what to expect: Ap?......