A system and method for enhanced security for external system management.
A request to manage a system is received from a client at an interface. A
determination is made whether a level of security is desired for the
interface. If a level of security is desired for the interface, then
identification information is obtained from the request and is converted
into a format that is compatible with the system to be managed. A
determination is made whether the system provides authorization for the
client to manage the system.