Network access control mechanisms interoperate to prevent unauthorized access and to enforce the organization's security policy. Access to the network must be categorized as administrator, user, or guest so the appropriate authorization can be assigned to the user requesting access to the network or a network element. Authorization requires an individual account identifier that has been approved, assigned, and configured on an authentication server. Authentication of user identities is accomplished through the use of passwords, tokens, biometrics, or in the case of multi-factor authentication, some combination thereof. Lack of authentication enables anyone to gain access to the network or possibly a network element providing opportunity for intruders to compromise resources within the network infrastructure.
While the DNS application itself does not employ interactive users, the platform on which the DNS application resides may allow them depending on the implementation. As such, the DNS implementation, as a whole, must disallow directly accessing the system through group accounts. For example, on a UNIX based system running in an operational state, the user "root" should not be able to log directly onto the system. An individual wishing to access root functions should first log into the system using their individual account and then use the "sudo" command to gain root access. |