- mutual authentication
- A feature of authentication schemes such as Kerberos that requires both the client and the server to prove their identity to each other before authentication can proceed.See also Kerberos.
Dictionary of networking . 2014.
Look at other dictionaries:
Mutual authentication — or two way authentication (sometimes written as 2WAY authentication) refers to two parties authenticating each other suitably. In technology terms, it refers to a client or user authenticating themselves to a server and that server authenticating … Wikipedia
mutual authentication — abipusė patikra statusas Aprobuotas sritis informacija, informacinės technologijos ir informacinė visuomenė apibrėžtis Nuskaitymas, kai patikros sistema ir tikrinamasis dokumentas apsikeičia duomenimis, tikrindami vienas kito autentiškumą.… … Lithuanian dictionary (lietuvių žodynas)
Mutual — may refer to: Mutual organization, where customers derive a right to profits and votes Mutual information, the intersection of multiple information sets Mutual insurance, where policyholders have certain ownership rights in the organization… … Wikipedia
Extensible Authentication Protocol — Extensible Authentication Protocol, or EAP, is a universal authentication framework frequently used in wireless networks and Point to Point connections. It is defined in RFC 3748, which has been updated by RFC 5247. Although the EAP protocol is… … Wikipedia
Challenge-response authentication — For the spam filtering technique, see Challenge response spam filtering. For other uses, see CRAM (disambiguation). In computer security, challenge response authentication is a family of protocols in which one party presents a question (… … Wikipedia
Two-factor authentication — (TFA, T FA or 2FA) is an approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are. It is a part of the broader family of multi factor authentication, which is a defense in … Wikipedia
Multi-factor authentication — Multi factor authentication, sometimes called strong authentication, is an extension of two factor authentication. This is the Defense in depth approach of Security In Layers applied to authentication. While two factor authentication only… … Wikipedia
Closed-loop authentication — Closed loop authentication, as applied to computer network communication, refers to a mechanism whereby one party verifies the purported identity of another party by requiring them to supply a copy of a token transmitted to the canonical or… … Wikipedia
Lightweight Extensible Authentication Protocol — The Lightweight Extensible Authentication Protocol (LEAP) is a proprietary wireless LAN authentication method developed by Cisco Systems. Important features of LEAP are dynamic WEP keys and mutual authentication (between a wireless client and a… … Wikipedia
Comparison of open source configuration management software — This is a comparison of free (libre) and open source configuration management software. Contents 1 Basic properties 2 Platform support 3 Short descriptions 4 Refere … Wikipedia