After authentication comes authorisation and access control

In our first post in this series, we talked about authentication: verifying whether someone is who he or she claims to be. In many instances, this is where system administrators call it a day, by giving all verified users equal access to network resources. But there is much to be gained by continuing to apply … More After authentication comes authorisation and access control