
Authentication
Monday, June 27, 2005 | 8:00AM–8:00AM
Session Type:
Resources
Establishing an enterprise authentication service entails understanding the application security requirements, technology, and policy. In many ways, the difficult part about authentication is that it is the primary point in an identity management system that end users touch. How does authentication integrate with the identity management model, applications, and end-user behavior?