Slide 52 of 58
Notes:
These technologies make up the basis of our “Straw Man” security model. As I described in the previous slide, we intend to integrate these tools to form a seamless security architecture that will be the foundation for providing granular authentication and authorization controls.
First level authentication will be handled by Kerberos V5. Once authenticated, Kerberos credentials will be augmented with public key based certificates for accessing applications and information stores. Use of ticket and certificate credentials will limit further logins during the course of a work session. Authorization data will be provided through LDAP services linked to legacy profile data that will reside in a number of formats.