Privileged Access Control Methods

  • Paul Wright


Chapter 13 builds on the foundational theory of privileged access control (PAC) already described in Chapter 12 by providing a survey of the PAC solutions in the market, followed by a generic analysis of the basic methods of how they work.


Access Control Target Server Destination Server Foundational Theory Schema Owner 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Copyright information

© Paul Wright 2014

Authors and Affiliations

  • Paul Wright
    • 1
  1. 1.SurreyUK

Personalised recommendations