Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
SSL VPN : Understanding, evaluating and planning secure, web-based remote access

You're reading from   SSL VPN : Understanding, evaluating and planning secure, web-based remote access Understanding, evaluating and planning secure, web-based remote access

Arrow left icon
Product type Paperback
Published in Mar 2005
Publisher Packt
ISBN-13 9781904811077
Length 212 pages
Edition 1st Edition
Tools
Arrow right icon
Toc

Table of Contents (14) Chapters Close

SSL VPN
Credits
About the Authors
1. Introduction
1. Introduction to SSL VPN 2. SSL VPN: The Business Case FREE CHAPTER 3. How SSL VPNs Work 4. SSL VPN Security 5. Planning for an SSL VPN 6. Educating the User 7. Legacy Data Access 8. The Future of SSL VPN Technology A Review of TCP, IP, and Ports SSL VPN Gateways

Authentication and Authorization


As discussed in Chapter 3, SSL VPNs typically require that users identify themselves and prove their identities before granting access to internal resources.

Authentication

Authentication is usually achieved using one or more of the following factors:

  • Something only the user knows

  • Something only the user has

  • Something only the user is (i.e., a physical property of the user's person)

SSL VPN products support a variety of authentication schemes and leverage all three of the aforementioned methods of proving one's identity. Most commonly, users identify themselves using a username and authenticate using one of these several techniques:

Passwords

The user is supplied a secret password known only to the user and which is associated with the user's identification information (username). The SSL VPN compares this password to a copy of the password stored in a database or preferably performs a hash on the password and compares it to a previously hashed value of the correct...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image