Export (0) Print
Expand All

Access Policy Management: Authorizing for Access

Published: January 13, 2005

Summary

Establishing a common set of security policies across an entire organization presents a number of technical, managerial, and configuration challenges. Administrators are often responsible for managing access control for hundreds or thousands of applications, network resources, information resources, and hosts across the organization. In addition to providing reliable, secure access control, administrators must be able to create, manage, and enforce access control policies in a timely manner. Access control policies that are not centrally managed are costly to maintain and complicate the auditing and compliance reporting process.

This paper describes the Microsoft access policy management technologies that help organizations to secure applications, network access, information, and hosts by ensuring reliable authorization of users based on rules and roles.

Included in This Document

  • Introduction

  • Access Policy Challenges

  • Technologies Supporting Access Policy Management

  • Conclusion

  • Next Steps

Download

System Integrity: Ensuring Integrity

AccessPolicyMgt.doc
380 KB
Microsoft Word file

Get Office File Viewers

Was this page helpful?
(1500 characters remaining)
Thank you for your feedback
Show:
© 2014 Microsoft