Access Policy Management: Authorizing for Access

Published: January 13, 2005


Establishing a common set of security policies across an entire organization presents a number of technical, managerial, and configuration challenges. Administrators are often responsible for managing access control for hundreds or thousands of applications, network resources, information resources, and hosts across the organization. In addition to providing reliable, secure access control, administrators must be able to create, manage, and enforce access control policies in a timely manner. Access control policies that are not centrally managed are costly to maintain and complicate the auditing and compliance reporting process.

This paper describes the Microsoft access policy management technologies that help organizations to secure applications, network access, information, and hosts by ensuring reliable authorization of users based on rules and roles.

Included in This Document

  • Introduction

  • Access Policy Challenges

  • Technologies Supporting Access Policy Management

  • Conclusion

  • Next Steps


System Integrity: Ensuring Integrity

380 KB
Microsoft Word file

Get Office File Viewers