ABSTRACT

Other chapters in this section explore strong authentication technologies, such as smart cards and biometrics, which can help control access to information and resources more securely through the use of digital identities. Authentication technologies alone, however, are not sufficient to address the challenges of managing digital identities and permissions across a complex and networked environment serving increasing numbers of employees and customers with individual and evolving needs.