What does it mean to have identity at the center of your security infrastructure? At its core, it says that we have to build our solutions to always question who someone is, what they want to do. We can no longer blindly trust that just because they come from a known location those questions no longer matter. At the center of those questions is a critical concept: identity. At the center of those questions is one crucial idea: identity. Our solutions must continually validate the identity of the person accessing our applications and data. That includes authentication, authorization, and one that might not entirely be as obvious is administration. While it all sounds great in theory, what does that mean in reality? What steps do you take to get there? What does that mean for my firewall!?