Download presentation
Presentation is loading. Please wait.
1
AAA-Arch Authentication Schemes
Stephen Farrell John Vollbrecht Joe Salowey Standish Stewart
2
What we’re doing Starting work...
Similar to what we did with authorization Analyse authentication schemes no invention though! Figure out some models Match those with the authorization models
3
Factors Communications paths (topology)
Establishes shared secrets or not Requires time synchronisation or not Mutual authentication or not Type of pre-established data (root info, biometrics, shared-secrets) Allows impersonation or not
4
User -> Auth. Server AS User Application
5
App. -> Auth. Server AS User Application
6
Triangle? AS User Application
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.