The alternative administration approach is decentralized access control. In this
structure, users do not authenticate to one specific system, and one group is
not enforcing specific access rules. The environment may work in more of a
peer-to-peer relationship. In this type of environment, users access network resources
without being centrally authorized. The different resources may be
owned and maintained by different departments or users and theywill make the
decisions on who can access and use these resources.
In many environments, centralized and decentralized methods of access
control are combined, which ends up in a hybrid administration. The network
administratormay controlwho can access network resources (file servers,printers,
remote sites), and individual users can control who accesses their resources
(shares, local printers, directories). This provides more flexibility for the users,
but ensures that the critical assets are closelymonitored and at less risk of being
misused.
No comments:
Post a Comment