Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Authentication is the procedure through which a user or a device or a service (or application) provides sufficient credentials to satisfy access requirements to another service, application, or system.
User Authentication Strategy:
· Prepare and plan for Strong User Authentication
· Educate line of business application owners to use standard OS and directory protocol authentication and avoid application custom authentication.
· Use PKI product for digital certificate service and RMS product for license servic
· Keep Password logon as temporary authentication method for problematic road warriors
· Use Kerberos V5 as authentication protocol
· Use Smartcard/PIN two factor authentication, and evaluate USB Tokens, Wireless Smart Card, Biometrics, TPM authentication
Application/Service Authentication Strategy:
· Use Managed Password (strong password and changed by application itself), Hash, or Software Token for system account
· Evaluate TPM as long term solution for application/service authentication
Device Authentication Strategy:
· Use EAP-TLS machine cert in conjunction with user smart card cert for wireless LAN access
· Use Windows Vista (with Network Access Protection feature at server side) for wireless Corpnet LAN connection
· Use Windows Mobile 2005 (with software cert authentication) for wireless phone device email synchronization
· Evaluate TPM as long term solution for device authentication