Chapter 6

Confirm User Identity

Solutions in this chapter:

Introduction

Authentication is a measure of trust. The point of this chapter is to illustrate trust complexities and to cover authentication of both user identity and device identity. These two identities are not equal. Authentication in the networking world, in general, is based either on using a shared secret (you are authenticated if you know the secret) or on public key-based methods with certificates (you prove your identity by possessing the correct private key).

Authentication establishes the identities of devices and users to a degree that is in accord with your security policies. Authorization, on the other ...

Get How to Cheat at VoIP Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.