I’ve been recently dealing with a client who is looking at implementing authentication on their domains. He’s done a lot of background research into the schemes and has a relatively firm grasp on the issue. At this point we’re working out what policies he wants to set and how to correctly implement those policies. His questions were well informed for the most part. A few of them...
June 2, 2010
Who can you trust?
02June