authentication protocol is a type of computer communications protocol or cryptographic protocol specifically designed for transfer of authentication data...
10 KB (1,192 words) - 23:19, 10 July 2024
Extensible Authentication Protocol (EAP) is an authentication framework frequently used in network and internet connections. It is defined in RFC 3748...
34 KB (4,172 words) - 20:50, 1 May 2025
Extensible Authentication Protocol, also known as Protected EAP or simply PEAP, is a protocol that encapsulates the Extensible Authentication Protocol (EAP)...
10 KB (1,134 words) - 16:36, 5 July 2024
Kerberos (/ˈkɜːrbərɒs/) is a computer-network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure...
27 KB (3,023 words) - 15:26, 31 May 2025
Password Authentication Protocol (PAP) is a password-based authentication protocol used by Point-to-Point Protocol (PPP) to validate users. PAP is specified...
4 KB (493 words) - 04:16, 28 March 2025
different authentication and privacy protocols – MD5, SHA and HMAC-SHA-2 authentication protocols and the CBC_DES and CFB_AES_128 privacy protocols are supported...
40 KB (5,090 words) - 16:30, 12 June 2025
the Challenge-Handshake Authentication Protocol (CHAP) is an authentication protocol originally used by Point-to-Point Protocol (PPP) to validate users...
6 KB (755 words) - 07:44, 28 May 2024
Simple Authentication and Security Layer (SASL) is a framework for authentication and data security in Internet protocols. It decouples authentication mechanisms...
8 KB (693 words) - 07:26, 18 June 2025
LCP options: Authentication - Peer routers exchange authentication messages. Two authentication choices are Password Authentication Protocol (PAP) and Challenge...
21 KB (2,284 words) - 09:40, 21 April 2025
aspects: Key agreement or establishment Entity authentication Symmetric encryption and message authentication material construction Secured application-level...
9 KB (1,015 words) - 07:59, 25 April 2025
answer ("response") to be authenticated. The simplest example of a challenge-response protocol is password authentication, where the challenge is asking...
11 KB (1,540 words) - 19:04, 12 December 2024
RADIUS (redirect from Remote Authentication Dial In User Service)
Remote Authentication Dial-In User Service (RADIUS) is a networking protocol that provides centralized authentication, authorization, and accounting (AAA)...
33 KB (2,792 words) - 14:22, 16 September 2024
Mutual authentication or two-way authentication (not to be confused with two-factor authentication) refers to two parties authenticating each other at...
24 KB (3,032 words) - 11:26, 14 March 2025
Secure Shell (redirect from Secure Shell Protocol)
keeps private. While authentication is based on the private key, the key is never transferred through the network during authentication. SSH only verifies...
41 KB (4,509 words) - 06:22, 11 June 2025
Windows Authentication (IWA) is a term associated with Microsoft products that refers to the SPNEGO, Kerberos, and NTLMSSP authentication protocols with...
10 KB (892 words) - 18:31, 26 May 2024
authenticators to the verifier through an established authentication protocol, the verifier is able to infer the claimant's identity. Authenticators may...
30 KB (3,661 words) - 07:54, 24 May 2025
IPsec (redirect from Authentication Header)
communications over Internet Protocol (IP) networks. It supports network-level peer authentication, data origin authentication, data integrity, data confidentiality...
44 KB (5,337 words) - 03:03, 15 May 2025
(SRP) Protocol for TLS Authentication". RFC 5054 Carlson, James; Bernard Aboba; Henry Haverinen (July 2001). "EAP SRP-SHA1 Authentication Protocol". IETF...
28 KB (3,404 words) - 16:06, 8 December 2024
The Client to Authenticator Protocol (CTAP) or X.1278 enables a roaming, user-controlled cryptographic authenticator (such as a smartphone or a hardware...
4 KB (355 words) - 19:20, 11 April 2025
to describe its operation. It introduced a management protocol and cryptographic authentication scheme which have both survived into NTPv4, along with...
62 KB (6,428 words) - 11:00, 3 June 2025
Lightweight Extensible Authentication Protocol (LEAP) is a proprietary wireless LAN authentication method developed by Cisco Systems. Important features...
3 KB (273 words) - 10:50, 18 March 2022
The Central Authentication Service (CAS) is a single sign-on protocol for the web. Its purpose is to permit a user to access multiple applications while...
6 KB (697 words) - 13:27, 6 February 2025
SOCKS (redirect from SOCKS (Protocol))
Internet protocol that exchanges network packets between a client and server through a proxy server. SOCKS5 optionally provides authentication so only...
20 KB (2,273 words) - 16:47, 30 May 2025
e. within that 'reasonable' limit, could succeed. The Kerberos authentication protocol includes some countermeasures. In the classic case of a replay...
15 KB (2,054 words) - 08:39, 30 May 2025
NTLM (category Computer access control protocols)
security protocols intended to provide authentication, integrity, and confidentiality to users. NTLM is the successor to the authentication protocol in Microsoft...
29 KB (3,408 words) - 17:14, 6 January 2025
MS-CHAP (redirect from Microsoft Challenge Handshake Authentication Protocol)
the WPA-Enterprise protocol). It is further used as the main authentication option of the Protected Extensible Authentication Protocol (PEAP). Compared...
5 KB (586 words) - 13:29, 2 February 2025
Diameter is an authentication, authorization, and accounting (AAA) protocol for computer networks. It evolved from the earlier RADIUS protocol. It belongs...
30 KB (1,777 words) - 02:38, 26 May 2025
Protocol -- HTTP/1.0. Internet Engineering Task Force. sec. 10.16. doi:10.17487/RFC1945. RFC 1945. Reschke, Julian. The 'Basic' HTTP Authentication Scheme...
7 KB (863 words) - 12:00, 21 May 2025
CCMP (cryptography) (redirect from Counter Mode Cipher Block Chaining Message Authentication Code Protocol)
Chaining Message Authentication Code Protocol (Counter Mode CBC-MAC Protocol) or CCM mode Protocol (CCMP) is an authenticated encryption protocol designed for...
5 KB (594 words) - 05:39, 11 December 2024
July 2011. Digest access authentication was originally specified by RFC 2069 (An Extension to HTTP: Digest Access Authentication). RFC 2069 specifies roughly...
25 KB (2,879 words) - 04:06, 25 May 2025