Print Page   |   Contact Us   |   Your Cart   |   Sign In   |   Join Now
White Paper Forum (WPF)
Blog Home All Blogs
Search all posts for:   

 

View all (12) posts »
 

The Identity Pyramid

Posted By Stephen M. Hunt, Monday, December 22, 2008
Privilege, rather than identity, is the key to secure physical access control systems.   An access control system uses a verification cascade for granting access privileges to an individual.  Identity has an important initial role.  The final goal is an expedient and secure access transaction for the legitimate individual.   The featured diagram illustrates three distinct phases of verification applied to secure local access control operations.
 
See the attachment for additional discussion of Identity and Privilege..........

Download File (PDF)

Tags:  Access Control  ID Management  Identity  Privilege  Vetting 

Share |
Permalink | Comments (0)
 
Association Management Software Powered by YourMembership.com®  ::  Legal