Identity mapping: An approach to unravel enterprise security management policies

Authors Wolfgang Essmayr
Edgar Weippl
Title Identity mapping: An approach to unravel enterprise security management policies
Booktitle Proc. 16th IFIP World Computer Congress (WCC'2000)
Type in proceedings
Address Beijing, China
Month August
Year 2000
Pages 79-88
SCCH ID# 1
Abstract

Increasingly complex networks and distributed services require new security mechanisms. Both currently available solutions, i.e. directory services and distributed authentication systems have disadvantages that can be overcome by a new approach based on identity mapping.Identity mapping allows to map the identity of one human to different users in various systems. The security features of every system can be fully used and no common denominator limits the power of a single system. This paper describes the different types of mappings that are necessary to implement such a system. Mappings cannot occur only on a user-user basis but also roles and groups have to be considered to correctly represent modern security issues.