Case Studies and Examples
There are various methods for proving the identity of, authenticating, authorizing, and auditing remote access users. The following case studies help you learn how some of these tactics are used in the real world to ensure the communications are secure and the access granted does not compromise the organization.
Private Sector Case Study
Many companies are contemplating the use of VPN versus authentication to applications via the web. The Miller Corporation is no different. Miller Corporation is a small organization with five sales representatives located throughout the United States. There are no remote offices available for the sales reps. Four of the five sales reps ...
Get Access Control and Identity Management, 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.