Integrating Security and Policy with Enterprise Applications

The end goal of security

By itself, a PKI is not enough

Integrating Security - Incomplete Attempts

Where we are today

and for tomorrow

To Integrate Security

Credential Management

Security Integration

Generic Authorization and Access-control API

Extended Access Control Lists

Specification of Conditions

Integrating other services

Summary