About the Book
Please note that the content of this book primarily consists of articles available from Wikipedia or other free sources online. Pages: 49. Chapters: Computer access control protocols, Kerberos, Common Criteria, Challenge-handshake authentication protocol, Password authentication protocol, RADIUS, Extensible Authentication Protocol, Diameter, NTLM, IEEE 802.1X, Datacenter star audit, Cyber security standards, FIPS 140-3, Directory service, Rainbow Series, HOTP, FIPS 140-2, Needham-Schroeder protocol, Standard of Good Practice, Challenge-response authentication, Trusted Computer System Evaluation Criteria, ISO/IEC 27002, Protected Extensible Authentication Protocol, Basic access authentication, SMTP Authentication, SPNEGO, Simple Authentication and Security Layer, CRAM-MD5, Pluggable Authentication Modules, Neuman-Stubblebine protocol, Central Authentication Service, ITSEC, TACACS+, Wide Mouth Frog protocol, Yahalom, Reflection attack, BS 7799, LAN Manager, MS-CHAP, Otway-Rees protocol, POP before SMTP, BLACKER, IEEE 802.10, NTLMSSP, ISO 27799, ID-MM7, ISO 15292, Ticket Granting Ticket, AFSSI-5020, CTCPEC. Excerpt: Remote Authentication Dial In User Service (RADIUS) is a networking protocol that provides centralized Authentication, Authorization, and Accounting (AAA) management for computers to connect and use a network service. RADIUS was developed by Livingston Enterprises, Inc., in 1991 as an access server authentication and accounting protocol and later brought into the Internet Engineering Task Force (IETF) standards. Because of the broad support and the ubiquitous nature of the RADIUS protocol, it is often used by ISPs and enterprises to manage access to the Internet or internal networks, wireless networks, and integrated e-mail services. These networks may incorporate modems, DSL, access points, VPNs, network ports, web servers, etc. RADIUS is a client/server protocol that runs in the application layer, using UDP as transport. The Remote Access Server, the ...