Authentication (information security)/Related Articles
Jump to navigation
Jump to search
- See also changes related to Authentication (information security), or pages that link to Authentication (information security) or to this page or whose text contains "Authentication (information security)".
Parent topics
- Information security [r]: The set of policies and protective measures used to ensure appropriate confidentiality, integrity and availability to information; usually assumed to be information in a computer or telecommunications network but the principles extend to people and the physical world [e]
Subtopics
- Two-factor identification [r]: Add brief definition or description
- Multifactorial authentication [r]: Add brief definition or description
- Server authentication [r]: Add brief definition or description
- Password [r]: Add brief definition or description
- Biometrics [r]: Add brief definition or description
- Security token [r]: A pocket-sized device that generates a device-specific, time-variant authentication code, to be validated by an authentication server in combination with a user ID; the code is manually into a computer session by the user [e]
- RADIUS (information security) [r]: Add brief definition or description
- TACACS [r]: Add brief definition or description
- Kerberos [r]: A protocol using a central server to provide two clients with a shared session key, without either client having to publish a public key. [e]