Identity Management, Access Control, and Information Protection
Applies To: Windows Server 2008
Identity and access control features and technologies provide a central way of managing credentials and technologies to allow only legitimate users access to devices, applications, and data.
Establishing a valid user of information or resources in your environment requires that the user be able to provide two pieces of information to your network: identification and proof of identity.
Access control is the process of authorizing users, groups, and computers to access objects on the network by using permissions, user rights, and object auditing.
Information protection features and technologies help protect data at rest and while it is in transit, and allow you to apply more complex access control based on certificates and rights management.