Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
CompTIA Server+ Certification Guide

You're reading from   CompTIA Server+ Certification Guide A comprehensive, end-to-end study guide for the SK0-004 certification, along with mock exams

Arrow left icon
Product type Paperback
Published in Feb 2019
Publisher
ISBN-13 9781789534818
Length 514 pages
Edition 1st Edition
Arrow right icon
Author (1):
Arrow left icon
Ron Price Ron Price
Author Profile Icon Ron Price
Ron Price
Arrow right icon
View More author details
Toc

Table of Contents (28) Chapters Close

Preface 1. Section 1: System Architecture FREE CHAPTER
2. Server Hardware 3. Server Internals 4. Data Storage 5. Server Operating Systems 6. Addressing 7. Cabling 8. Section 2: Administration
9. Server Administration 10. Server Maintenance 11. Virtualization 12. Disaster Recovery 13. Section 3: Security
14. Security Systems and Protocols 15. Physical Security and Environmental Controls 16. Logical Security 17. Section 4: Troubleshooting
18. Troubleshooting Methods 19. Common Hardware Issues 20. Common Software Issues 21. Common Network Issues 22. Common Storage Issues 23. Common Security Issues 24. CompTIA Server+ Examination 25. Glossary 26. Assessment 27. Other Books You May Enjoy

Authentication protocols

The first part of the AAA procedure is authentication (followed by authorization and accounting), and attempts to verify that the user who's attempting to gain access has provided verifiable credentials or biometric evidence that they are who they say they are. In other words, all is well, if the password and username provided is in the list of good identifying data.

This may not be the most sophisticated level of security for all situations, but it's the most commonly used method for authenticating a user. A variety of protocols that use similar methods perform authentication. In the following sections, we'll look at the most common authentication protocols.

Authentication methods

...
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image