Authentication Methods and Services
From Modules 3 and 11, you now understand what authentication is and why it’s a distinct process in the overall process of identification, authentication, and authorization. In this module we will focus on authentication methods and services, and we’ll describe their role in the process used to get authorized users the right access to systems and data. We will look at various protocols and techniques used to authenticate both local (within the network) and remote (outside the network boundaries) users, and how these fit into the overall authentication process.
In Module 11 we defined authentication as the process of validating user credentials, usually against a centralized ...