One of the challenges for remote access technology is providing role-based access to groups and individuals outside of your organization. Their assets are essentially untrusted, and their accounts often fall outside of your control. They are essentially foreign entities that need validation and authentication before any connection or remote session can occur. This typically occurs for vendors and contractors that need remote access into your environment, but there is no directory service or authoritative store that can be established ...
17. Remote Access
Get Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.