Manage Learn to apply best practices and optimize your operations.

Security authentication: Strategy to implementation

IT consultants need to know how to implement a large strategic authentication plan. Get details on issues like the benefits of multiple LDAP corporate directories, using group policies at the directory level, and the use of tiered groups to best control internal and external user access so you'll be prepared.

IT consultants need to know how to implement a large strategic authentication plan. Get details on issues like the benefits of multiple LDAP corporate directories, using group policies at the directory level, and the use of tiered groups to best control internal and external user access so you'll be prepared.

Authentication in the real world: Moving from strategy to implementation

When management wants to roll out a strong authentication system across a heterogeneous IT environment, security administrators face the challenge of effectively weaving an authentication plan into diverse directories such as LDAP, Microsoft Active Directory and Novell NDS. In this tip, we look at taking a large strategic authentication plan and putting it into tactical implementation, examining issues like the benefits of multiple LDAP corporate directories, using group policies at the directory level, and the use of tiered groups to best control internal and external user access.

security authentication

About the author
Tom Bowers, CISSP, PMP and a Certified Ethical Hacker, is a well known expert on the topics of ethical hacking, penetration testing and protection of the global enterprise. He is the vice president of the Philadelphia chapter of Infragard, the second largest chapter in the country with more than 600 members. Additionally, he serves as manager of information security operations for a fortune 100 pharmaceutical company, where his areas of expertise include risk assessment and leading information protection teams for 120 offices globally. Bowers is a technical editor of
Information Security magazine and a regular speaker at events like Information Security Decisions.


Get more information on strategies for your customer's implementation.

Dig Deeper on Campus area networks and services

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

MicroscopeUK

  • Channel roundup: Who's gone where?

    Time for the weekly roundup of personnel moves across the industry with several senior roles being filled in the last seven days

  • Plenty of life in mainframes

    Those assuming that it was time to take the mainframe in the corner out for a long walk of a short pier will be surprised to hear...

  • What to expect in Q4

    AI, contact centres and security are among the areas where the channel might gain in this quarter, according to industry figures

SearchSecurity

SearchStorage

SearchNetworking

SearchCloudComputing

SearchDataManagement

SearchBusinessAnalytics

Close