April 2002
Intermediate to advanced
944 pages
25h 43m
English
As part of the decision-making process of what remote access solution you will use for your environment, you also should carefully evaluate how you will provide authentication. The means of authentication for remote access solutions varies widely. What authentication options your vendor supports and how authentication is handled is very important for ensuring both the security and scalability of your remote access solution. Although most means of authentication are secure, you will find that many means of authentication do not scale well for large enterprise deployments. The following sections cover the most common means available today.
Most remote access solutions offer some type of local user ...
Read now
Unlock full access