Jump to content

Identity-based security

From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by Pete Mahen (talk | contribs) at 12:34, 29 March 2014 (Created page with 'Identity-based security is a kind of security which includes security components that provide visibility and controls on the user activity in a particular networ...'). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.
(diff) ← Previous revision | Latest revision (diff) | Newer revision → (diff)

Identity-based security is a kind of security which includes security components that provide visibility and controls on the user activity in a particular network. It offers a more robust network security system which includes a user's human identity as part of the firewall rule matching criteria [1].

The concept includes treating a user's identity as the 8th Layer (also known as the HUMAN layer) in the network protocol stack, thus, attaching user identity to security while authenticating, authorizing and auditing the network. This takes organizations a step ahead of conventional security app. [2] Such an approach allows organisations to create security policies that align to users and groups rather than to IP addresses which ultimately gives them more precise control over who can access the network—and what they can access. [3].

Identity based security prevents systems against address spoofing attacks by combining the point of encryption, authentication, and access control into a single unit.[4]

  1. ^ Cyberoam Identity based security
  2. ^ Layer 8 Technology
  3. ^ Cisco Identity-Based Firewall Security
  4. ^ [hhttp://www.arubanetworks.com/pdf/solutions/identity-based-security.pdf Identity-Based Security] - Aruba Networks