From the course: CompTIA CySA+ (CS0-002) Cert Prep: 3 Identity and Access Management
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Password authentication protocols
From the course: CompTIA CySA+ (CS0-002) Cert Prep: 3 Identity and Access Management
Password authentication protocols
- [Narrator] Many access control systems rely upon password-based mechanisms to implement something you know security. One of the most common applications of password security is to secure virtual private networks and other remote access technologies. Let's take a look at the protocols used to implement remote access password security. The Password Authentication Protocol, or PAP, is the earliest of these protocols. In this protocol, the client wishes to authenticate to a server, and both the client and server know the user's password. The client simply transmits the username and password to the server, and the server validates the password. That's about as simple as it gets, and successfully implements password authentication. But there's one major flaw to this protocol. PAP does not use any encryption to protect this communication. Anyone able to eavesdrop on the connection can read the username and password right off…
Contents
-
-
-
-
-
Authentication factors3m 30s
-
(Locked)
Multi-factor authentication2m 33s
-
(Locked)
Something you have3m 15s
-
(Locked)
Password authentication protocols2m 45s
-
(Locked)
Single sign-on (SSO) and federation2m 46s
-
(Locked)
RADIUS and TACACS3m 37s
-
(Locked)
Kerberos and LDAP5m 13s
-
(Locked)
SAML2m 38s
-
(Locked)
IDaaS3m 11s
-
(Locked)
Advanced authorization concepts6m 24s
-
-
-
-