User authentication is a fundamental component of security policies across the network. From a user’s perspective, this can be accomplished in multiple ways:
- Username and password
- Token generators
- Fingerprint readers
- A combination of multiple factors
The PKI (Public Key Infrastructure) is a complex authentication technique that functions using digital certificates. These certificates provide a certain level of trust to the communication, as they authenticate the sender. The PKI uses the concept of Certificate Authority (CA) for the central entity that issues certificates to users. The CA confirms the identity . . .
The content below this message is for members only.