O'Reilly logo

Access Control, Authentication, and Public Key Infrastructure by Tricia Ballad, Bill Ballad, Erin Banks

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 6. Mapping Business Challenges to Access Control Types

IN THIS CHAPTER, YOU WILL TAKE what you have already learned about access control and use it to design a comprehensive access control system. All access control systems are about solving problems and meeting business needs.

First, we will review access control types. Next, we will examine each step you should follow in designing an access control system. Finally, we will discuss how access control systems are used in the real world.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required