Security Solutions
1-15
Access Control Concepts
Network Access Control Technologies
Network Access Control Process
Figure 1-1 shows the typical components of the network access control
architecture.
Figure 1-1. Network Access Control Architecture
You will learn more about how the four components interact in discussions
of specific network access control technologies. For now, you should simply
be familiar with the vocabulary and the most basic process:
1. An endpoint attempts to gain access to the network.
2. The PEP requests and receives the user’s credentials from a utility on the
endpoint.
3. With the credentials, the PEP composes an access request, which it
forwards to the PDP.
4. The PDP seeks information about the user from the policy repository.
On the basis of this information, it decides whether or not to authenticate
the user.
With IDM, the PDP can factor additional criteria (such as location, time,
and user group) into the decision.