"Network security officers and administrators need solutions that support flexible authentication and authorization policies that are tied to a user's identity as well as to context such as the network access type, time of day, and the security of the machine used to access the network." . . . .