Cloud based security or how does a provider ensure the safety of data

How does the provider know the identity of the client? The most common authentication method is password protection. However, providers seeking to offer their customers a higher level of reliability resort to using more powerful tools, such as certificates and tokens. Along with the use of more reliable authentication tools, providers should be able to work with standards such as LDAP and SAML. This is necessary to ensure the cloud security with the client user identification system during authorization and determination of the authority granted to the user. The worst option is when the client provides the provider with a specific list of authorized users. As a rule, in this case, the dismissal of an employee or his transfer to another position may cause difficulties.

 
Back
Top