Defining Roles for Identity Management and Network Access Control

The shared imperative that both NAC and traditional IdM (identity management) vendors are having to address is the larger problem of roles. The defining of, management of, refining of, and enforcement of roles is the lynchpin that is focusing deployments *across* the identity layers – be they the network or application layer.

Read this article from ZDNet’s Digital ID World blog



*Expand your knowledge of “IdM” (and add what you know) at the Whats New Media Wiki

Advertisements

Leave a comment

Filed under Anonymity, Technology, our Mirror, Virtual Communities

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s