![]() Existing password authentication schemes can be categorized into two types: weak-password authentication schemes and strong-password authentication schemes. Password-based authentication is the protocol that two entities share a password in advance and use the password as the basis of authentication. It is used as a last resort when the remote server does not support a stronger authentication protocol, like CHAP or EAP (the latter is actually a framework). PAP transmits unencrypted ASCII passwords over the network and is therefore considered insecure. Almost all network operating system remote servers support PAP. PAP is used by Point to Point Protocol to validate users before allowing them access to server resources. A password authentication protocol ( PAP) is an authentication protocol that uses a password.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |