Deep Dive

Download the InfoWorld Authentication and Authorization Deep Dive report

FREE

Become An Insider

Sign up now and get free access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content from the best tech brands on the Internet: CIO, CITEworld, CSO, Computerworld, InfoWorld, ITworld and Network World. Learn more.

Find out how to implement authentication and authorization security controls in your company, with help from InfoWorld's expert guide

infoworld auth and auth

The Internet works because of trust and access control. Trust that the person poking you on Facebook is really a friend. Trust that the bank that issued your credit card will let only you or authorized employees view your account. Even the anonymous parts of the Internet can't exist without security controls that enable people to determine who has access and what they can do. Without access controls, anyone can destroy the trust value of any website -- and bring it down.

In this 11-page PDF, InfoWorld contributing editor and security expert Roger Grimes offers a short course on the topic, including clear explanations of identity, access control, and the forensics of user activity, with a special section on the latest developments. This Deep Dive will show you how to apply authentication, authorization, and accounting to your business computing infrastructure -- the right way.

To continue reading, please begin the free registration process or sign in to your Insider account by entering your email address: