Authentication and Authorization Technologies

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/5

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

6 Terms

1
New cards

The Extensible Authentication Protocol (EAP)

is an authentication framework that is commonly used for wireless networks

2
New cards

Challenge Handshake Authentication Protocol (CHAP)

is an authentication protocol designed to provide more security than earlier protocols like PAP. CHAP uses an encrypted challenge and three-way handshake to send credentials

3
New cards

802.1x

Is an IEEE standard for network access control (NAC), and it is used for authentication for devices that want to connect to a network. In 802.1x systems, supplicants send authentication requests to authenticators such as network switches, access points, or wireless controllers

4
New cards

Remote Authentication Dial-In User Service (RADIUS)

can operate via TCP or UDP and operates in a client-server model. RADIUS sends passwords that are obfuscated by a shared secret and MD5 hash, meaning that it’s password security is not very strong. RADIUS traffic between the RADIUS network access server and the RADIUS server is typically encrypted using IPSec tunnels or other protections to protect the traffic

5
New cards

Terminal Access Controller Access Control System Plus (TACACS+)

uses TCP traffic to provide authentication, authorization, and accounting services

6
New cards

Kerberos

is a protocol for authenticating services requests between trusted hosts across an untrusted network like the Internet