In this chapter, we will provide you with an overview about the important authentication protocols you need to know in order to handle your configurations and projects in that field.
We see a lot of confusion in the usage of authentication protocols in our projects. It's very important to understand the different protocols, that you can discuss with application providers about the correct implementation tasks and requirements. We see very often that a lot of time is used for discussing authentication methods and solutions. It's clearly impossible to put all the material about the different authentication methods in only one chapter, as that would fill a complete book in the real world. We decided to provide you with essential summaries with extensive and working external examples. We will deploy many of the different authentication...