The Defense Department's strategy to develop an enterprise architecture includes giving military personnel unique IP addresses, enabling users to connect into a network anywhere in the world and retrieve their data reliably and securely. The key to creating such an environment is identity and access management (IAM) technology, which needs to be both strong and usable to allow personnel to work securely and effectively. "We are seeing a renewed emphasis on using [common access cards] for authenticating [users] to as many resources as possible: workstations, Linux servers, websites and even Mac laptops and workstations," said Jack Miles, a senior systems engineer at Centrify. "By using CAC cards, DoD is able to force two-factor authentication with a hard-coded identity certificate bound to the card and a PIN known only to the soldier or sailor."
展开▼