Authentication Methods and Services

From Modules 3 and 11, you now understand what authentication is and why it’s a distinct process in the overall process of identification, authentication, and authorization. In this module we will focus on authentication methods and services, and we’ll describe their role in the process used to get authorized users the right access to systems and data. We will look at various protocols and techniques used to authenticate both local (within the network) and remote (outside the network boundaries) users, and how these fit into the overall authentication process.

Authentication Concepts

In Module 11 we defined authentication as the process of validating user credentials, usually against a centralized ...

Get Mike Meyers' CompTIA Security+ Certification Guide (Exam SY0-401) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.