Download presentation
Presentation is loading. Please wait.
Published byRafe Bell Modified over 8 years ago
1
Authentication Protocols Natalie DeKoker, Lindsay Haley, Jordan Lunda, Matty Ott
2
Protocols and Security Point-to-Point Protocol (PPP) Direct Connection Between Two Computers Authenticates, Encrypts, Compresses Network Control Protocol Runs Atop PPP and negotiates options for PPP
3
Protocols Password Authentication Protocol (PAP) Uses Password to validate Users MS-CHAP Microsoft’s Authentication Protocol for Virtual Private Networks
4
Security Security (AAA) Authentication, Authorization, and Accounting (AAA) Dictates which users have access or control over parts of the network
5
RADIUS Remote Authentication Dial-In User Service (RADIUS) The more common between the AAA standards 3 devices: Radius Server, Network Access Servers (NASs), and group of systems that dial into the network Internet Authentication Service (IAS) most common built in with most Windows Server operating systems FreeRADIUS UNIX/LINUX
6
TACACS+ Terminal Access Controller Access Control System Plus
8
Kerberos Key Distribution Center (KDC) Authentication Server (AS) Ticket-Granting Service Ticket-Granting Ticket (TGT) 2:15 PM Expires 12:15 AM lcelin1 geauxtigers lsaceldsainasdf1 gjhyeaubsfxtishjgeascrs 2:15 PM
9
Kerberos Key Distribution Center (KDC) Authentication Server (AS) Ticket-Granting Service Ticket-Granting Ticket (TGT) 2:15 PM
10
Kerberos - Strengths Time stamping forces new token requests Prevents 3 rd Parties from intercepting tokens Tokens not likely to be cracked within time span
11
Kerberos - Weaknesses If KDC goes down, no one has access Important to maintain backup Time stamping requires clients to have synchronized clocks
12
EAP Extensible Authentication Protocol (EAP) EAP-PSK
13
EAP EAP-TLS (Transport Layer Security) and EAP-MS-CHAP
14
EAP EAP-TTLS and EAP-MS-CHAPv2 Protected Extensible Authentication Protocol (PEAP)
16
EAP EAP-MD5 Fizzy Lifting Drinks 02a5c67f32b91ccfea Fizzy Lifting Drinks
17
EAP Lightweight Extensible Authentication Protocol (LEAP)
18
802.1x My Computer AuthenticatorAuthentication Server Port-Base Network Access Control (PNAC)
19
The End
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.