Access Policy Management: Authorizing for Access
Summary
Establishing a common set of security policies across an entire organization presents a number of technical, managerial, and configuration challenges. Administrators are often responsible for managing access control for hundreds or thousands of applications, network resources, information resources, and hosts across the organization. In addition to providing reliable, secure access control, administrators must be able to create, manage, and enforce access control policies in a timely manner. Access control policies that are not centrally managed are costly to maintain and complicate the auditing and compliance reporting process.
This paper describes the Microsoft access policy management technologies that help organizations to secure applications, network access, information, and hosts by ensuring reliable authorization of users based on rules and roles.
Included in This Document
Introduction
Access Policy Challenges
Technologies Supporting Access Policy Management
Conclusion
Next Steps
Download
System Integrity: Ensuring Integrity
AccessPolicyMgt.doc
380 KB
Microsoft Word file