2.18. Identifying Authentication Protocols
When two computers exchange information through a network, the only physical change that takes place is a fluctuation in current or radio signal (in the case of a wireless communication). Based on the precise way the fluctuation occurs, we can use authentication protocols that enable one computer or user to prove its identity to another user. In essence, authentication protocols are the way that a computer or a user communicates the concept, "I am who I say I am and I can prove it."
Authentication protocols have evolved over the last several years, and there are many from which you can choose depending on your network's security needs. We will discuss the common authentication protocols in use today. ...
Get Network+™ Fast Pass now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.