1.7 Conclusion


This chapter introduced the typical TSI services and showed how Microsoft can help in this space. It introduced the Microsoft TSI product offerings and shed some light on the TSI features that come bundled with the Windows Server 2003 Operating System, which is explored in greater detail in the rest of this book.

Selected bibliography

Authorization Infrastructures

  • AMR Research, C. Quirk and C. Niven: “Achieving Access Management Efficiencies Through Single Sign-On.”

  • Burton Group Technical Position on “Access Management.”

  • Oppliger, R., “Using Attribute Certificates to Implement Role-Based Authorization and Access Controls.”

Authentication Infrastructures

  • Burton Group, Single Sign-On, Network Strategy Report.

  • Burton Group Technical Position on “User Authentication.”

  • Network Applications Consortium (NAC) Position Paper: “Enterprise-Wide Security: Authentication and Single Sign-On.”

  • Smith, R. E., Authentication: From Passwords to Public Keys, Reading, MA: Addison-Wesley, 2002.

Provisioning Systems

  • Active Digital Profile: http://www.adpr-spec.com/.

  • Burton Group Network Strategy, Directory-Based Resource Provisioning Systems, Report.

  • Burton Group Technical Position on “Identity Management.”

  • XRPM working group: http://www.xrpm.org.Trust

  • Essinger, J., Internet Trust and Security, Reading, MA: Addison-Wesley, 2001.




Windows Server 2003 Security Infrastructures. Core Security Features of Windows. NET
Windows Server 2003 Security Infrastructures: Core Security Features (HP Technologies)
ISBN: 1555582834
EAN: 2147483647
Year: 2003
Pages: 137
Authors: Jan De Clercq

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net