The network authentication process can take many different forms. In this video, you’ll learn about PAP, CHAP, EAP, PEAP, Kerberos, single sign-on, and multi-factor authentication.
Providing a secure, single sign-on process is the goal of most network and application administrators. In this video, you’ll learn how single sign-on works and how it can be used to create a seamless authentication infrastructure for your user community.
Without single sign-on capabilities, much of our day would be spent authenticating over and over again to our network resources. In this video, you’ll learn about SSO and how it can be used on both local network resources and diverse resources across the Internet.
Kerberos is a standard authentication method, and the integration of Kerberos into Microsoft Windows has also made it one of the most popular. In this video, you’ll learn the step-by-step process of Kerberos authentication.
During a normal day, we are constantly authenticating our user credentials to web sites, file servers, and other network resources. As with most technologies, there’s more than one way to perform these authentications. In this video, you’ll learn what’s happening over the wire and become familiar with PKI, Kerberos, AAA, network access control technologies, CHAP, EAP, and much more.