Authentication, Authorization, and Auditing
Are you who you say you are?
Are you supposed to have access to certain spaces.
Viewing the log files and seeing what happens.
Access control list, specifies what users have what access.
Access control management for organizations. Crucial to secure systems.
Last updated 2 years ago