In This Chapter
Identifying your identity
Mapping out your users
Grasping identity and folding it into your network-access-control–based network can move your network into the next generation. Tie your network to your authentication servers to create a detailed view of your network and who has access to what. This view gives you something that you can see and control!