Identity Management, Access Control, and Information Protection

Updated: April 29, 2008

Applies To: Windows Server 2008

Identity and access control features and technologies provide a central way of managing credentials and technologies to allow only legitimate users access to devices, applications, and data.

Establishing a valid user of information or resources in your environment requires that the user be able to provide two pieces of information to your network: identification and proof of identity.

Identity Management

Access control is the process of authorizing users, groups, and computers to access objects on the network by using permissions, user rights, and object auditing.

Access Control

Information protection features and technologies help protect data at rest and while it is in transit, and allow you to apply more complex access control based on certificates and rights management.

Information Protection

See Also

Community Additions