0% found this document useful (0 votes)
100 views1 page

Task 2 Activity 3 - Analysing Effect of Encryption On User Roles

The document outlines various roles in enterprise administration including the enterprise administrator who is responsible for identifying, documenting, evolving, protecting and retiring corporate IT assets. The group or policy administrator provides a centralized place to manage operating systems, applications and user settings while the enterprise authenticator authenticates users across the organization and validates their credentials. The group or policy authenticator adds users, computers and service accounts to groups and users have defined permissions to perform administrative, editing, authoring, contributing and subscriber tasks.

Uploaded by

Ohms Branguelo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
100 views1 page

Task 2 Activity 3 - Analysing Effect of Encryption On User Roles

The document outlines various roles in enterprise administration including the enterprise administrator who is responsible for identifying, documenting, evolving, protecting and retiring corporate IT assets. The group or policy administrator provides a centralized place to manage operating systems, applications and user settings while the enterprise authenticator authenticates users across the organization and validates their credentials. The group or policy authenticator adds users, computers and service accounts to groups and users have defined permissions to perform administrative, editing, authoring, contributing and subscriber tasks.

Uploaded by

Ohms Branguelo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

Role Description

Enterprise Administrator  Identifying


 Documenting
 Evolving
 Protecting
 Retiring corporate IT assets.

Group or Policy Administrator  Provides a centralized place for administrators


 Manage and configure operating systems, applications,
and users' settings.

Enterprise Authenticator  Authenticates users across the organization


 Validate the user's credentials.

Group or Policy Authenticator  Adding user


 Adding computer
 Adding service accounts to groups

User Defines permissions for users to perform a group of tasks

Such as:

 Administrator
 Editor
 Author
 Contributor
 Subscriber

Lead College Pty Ltd RTO No: 41489 CRICOS Code: 03636F
Analysing Effect of Encryption on User Roles – ICTNWK502 Implement Secure Encryption Technologies Page 1

You might also like