...
首页> 外文期刊>C4ISR: The journal of net-centric warfare >The balancing act: Developing identity and access management for a secure but usable
【24h】

The balancing act: Developing identity and access management for a secure but usable

机译:平衡行为:开发身份和访问管理以确保安全但可用

获取原文
获取原文并翻译 | 示例
           

摘要

The Defense Department's strategy to develop an enterprise architecture includes giving military personnel unique IP addresses, enabling users to connect into a network anywhere in the world and retrieve their data reliably and securely. The key to creating such an environment is identity and access management (IAM) technology, which needs to be both strong and usable to allow personnel to work securely and effectively. "We are seeing a renewed emphasis on using [common access cards] for authenticating [users] to as many resources as possible: workstations, Linux servers, websites and even Mac laptops and workstations," said Jack Miles, a senior systems engineer at Centrify. "By using CAC cards, DoD is able to force two-factor authentication with a hard-coded identity certificate bound to the card and a PIN known only to the soldier or sailor."
机译:国防部开发企业体系结构的策略包括为军事人员提供唯一的IP地址,使用户可以连接到世界任何地方的网络并可靠,安全地检索其数据。创建这样的环境的关键是身份和访问管理(IAM)技术,该技术必须强大且可用以允许人员安全有效地工作。 Centrify的高级系统工程师Jack Miles说:“我们看到了重新强调使用[通用访问卡]对[用户]进行尽可能多的资源身份验证:工作站,Linux服务器,网站甚至Mac笔记本电脑和工作站。 。 “通过使用CAC卡,DoD可以通过绑定到卡上的硬编码身份证书和只有士兵或水手才知道的PIN来强制进行双重身份验证。”

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号