Chapter 9. Identity Design Considerations

This chapter covers the following topics:

Basic Foundation Identity Concepts

Types of Identity

Factors in Identity

Role of Identity in Secure Networking

Identity Technology Guidelines

Identity Deployment Recommendations

A good name is better than precious ointment. —Ecclesiastes, 7:1

“Must a name mean something?” Alice asked doubtfully.

“Of course it must,” Humpty Dumpty said with a short laugh: “my name means the shape I am—and a good handsome shape it is, too. With a name like yours, you might be any shape, almost.” —Lewis Carroll, Through the Looking-Glass, 1872

Identity is a foundation technology in secure networking. It, more than any other technology, interfaces directly with the network’s ...

Get Network Security Architectures now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.