Step 2: Identify areas of credential challenges.
Credential challenges are the times at which users are prompted
to provide IDs and passwords. The first step is to evaluate your existing
network infrastructure and identify which credential challenges exist
for your users. Approach this step by simulating a typical day and
identifying all the points at which users are prompted to provide
credentials. For example, in a corporate environment, users may have
to provide credentials when attempting to access any of the following
resources:
- operating system
- corporate home page
- Web-based applications
- host-based applications