Vous êtes sur la page 1sur 10

Identity and Access

Policy Distribution &


Transformation

Identity Services

Proxy/
Intermediary

Authentication
Services

Security Policy

Monitoring &
Reporting

Policy Decision

Firewall

Firewall

Policy Administration

Client System
(browser,
rich client)

Business Security Services

Web Application
Server/Portal
Server

Infrastructure

Existing
Application

IT Security
Services

Policy Enforcement

Vous aimerez peut-être aussi