This is the second column of a two-part review on thetopic of identity and authentication management aspresented in the November 2017 NISO webinar“Engineering Access under the Hood, Part One –Challenges of Identity and AuthenticationManagement.”.
展开▼