Identity Management: Role Based Access Control for Enterprise Services

Identity Management: Role Based Access Control for Enterprise Services PDF Author:
Publisher:
ISBN:
Category :
Languages : en
Pages : 31

Get Book Here

Book Description
The current Department of Defense (DoD) Network consists of separate domains, disparate networks that are geographically dispersed, and resourced by hundreds of diverse funding sources. As we move into a Network Centric DoD Enterprise and as Web and data services become available throughout the DoD Network with applications becoming Enterprise wide, an unreasonable burden will be placed on the service providers to research and gather the appropriate data to determine if users requesting access should be authorized that access. A most challenging problem in managing large distributed systems is the complexity of security administration. Since most applications are not yet available as Web Services but rather still controlled within a certain localized command or enclave, the issue of authorization is manageable albeit error prone and expensive. DoD transformation to a Network Centric environment requires robust authentication of users and Web Services for C2 based on PKI/biometric technology and subsequent authorization/Access to data/services/applications provided by an Enterprise Role Based Access Control (ERBAC) system. This paper is designed to convey information to the audience of the importance, necessity, and urgency associated with the problem, the need to commit resources for a solution and subsequently working within that solution across the DoD enterprise.