« Vulnerability Puzzles and Mysterious Threats | Main | Authorization: Standards and Granularity »

Comments

James

Would you agree that enterprises need to go beyond just building better authentication mechanisms such as support for SAML and go deeper in terms of authorization? What would it take to get security folks to also add XACML to their list of frequently mentioned acroynms...

Gunnar

Very good questions, I added a post to address these points

http://1raindrop.typepad.com/1_raindrop/2007/01/authorization_s.html

The comments to this entry are closed.