Difference between revisions of "Authentication Protocols"
From MgmtWiki
(Created page with "==Full Title or Meme== A collection of Authentication protocols are compared and contrasted. ==Context== Since Kerberos was released at MIT in 1999 as a means to allo...") |
(→Context) |
||
Line 3: | Line 3: | ||
==Context== | ==Context== | ||
− | Since [[Kerberos]] was released at MIT in 1999 as a means to allow [Single Sign On]] by students and staff to the variety of systems available at the university, the combination of one user sign on to a variety of different services has been promoted as necessary in the variety of network services now available to users. There are two distinct cases and a wide range of intermediate cases that are addressed by authentication protocols: | + | Since [[Kerberos]] was released at MIT in 1999 as a means to allow [[Single Sign On]] by students and staff to the variety of systems available at the university, the combination of one user sign on to a variety of different services has been promoted as necessary in the variety of network services now available to users. There are two distinct cases and a wide range of intermediate cases that are addressed by authentication protocols: |
===Captive users and services=== | ===Captive users and services=== |
Revision as of 20:22, 11 July 2018
Contents
Full Title or Meme
A collection of Authentication protocols are compared and contrasted.
Context
Since Kerberos was released at MIT in 1999 as a means to allow Single Sign On by students and staff to the variety of systems available at the university, the combination of one user sign on to a variety of different services has been promoted as necessary in the variety of network services now available to users. There are two distinct cases and a wide range of intermediate cases that are addressed by authentication protocols:
Captive users and services
At MIT and at most corporations there is a pre-existing legal agreement that is signed by all users that applies to all services.