W. Essmayr, E. Weippl. Identity mapping: An approach to unravel enterprise security management policies. pages 79-88, 8, 2000.
- Wolfgang Essmayr
- Edgar Weippl
|Buch||Proc. 16th IFIP World Computer Congress (WCC'2000)|
||Increasingly complex networks and distributed services require new security mechanisms. Both currently available solutions, i.e. directory services and distributed authentication systems have disadvantages that can be overcome by a new approach based on identity mapping.Identity mapping allows to map the identity of one human to different users in various systems. The security features of every system can be fully used and no common denominator limits the power of a single system. This paper describes the different types of mappings that are necessary to implement such a system. Mappings cannot occur only on a user-user basis but also roles and groups have to be considered to correctly represent modern security issues.