The term "identity-based networking" has actually been around for many years, referring to the idea that a user's identity is somehow tied into the networking services that user can receive. When wireless LAN controllers first emerged, for example, they applied they concept of identity-based networking by not only authenticating users joining the wireless network but also by placing them into the appropriate virtual LANs (VLANs).
- Business transforms when it comes together | Unite your IT , Ops, and Applications teams with shared solutions. Get Ready - Red Hat Cloud
- Upskill your Team. Transition your Career. Cyber Security Foundation & Practitioner™ instructor-led course, for anyone needing a solid understanding of Cyber Security.