[Agenda] [Examples] [Network Partitioning] [Concepts] [Policy] [Process] [Organization] [HW-SW] [Cases studies] [Conclusion] [Resources]
[first slide] Authentication [previous slide] [next slide]


* Network security policy requires authentication of
o Hosts & Network devices
o Users

* Host & Network device authentication
o Today : only identification with IP address
o Tomorrow : X.509 certificate

* Key managment with PKI
o Solves the scalability issue of authentication
o The PKI could become the Security Policy Decision Point
o The network is a Distributed Policy Enforcement Point for the Security Policy

Authentication is the challenge of PKI


*********************************************************************
HSC ® © Hervé Schauer Consultants December 1999 - 142, rue de Rivoli - F-75001 Paris - France
Phone: +33 141 409 700 - Fax: +33 141 409 709 - Email: <secretariat@hsc.fr>
- Page 52 -