Elements and Performance Criteria
- Determine authentication requirements
- Configure authentication software or tools
- Create an authentication realm and reuse as required to protect different areas of server
- Add users and authorisation rules to new realm according to business needs
- Describe user attributes and user attribute set-up
- Set up an authentication filter and authorisation parameters on the appropriate server according to business requirements
- Apply authentication methods
- Develop or obtain authentication protocols as required
- Develop and distribute related methods to users according to business need
- Brief user on authentication system and their responsibilities according to enterprise security plan
- Apply authentication system to network and user according to system product requirements
- Record and store permission and configuration information in a secure central location
- Monitor authentication system