The more interaction I have with customers who are getting started with Identity projects, the more I realize that a simple explanation and comparison of the differences between EAP types is needed.
TLS authentication uses public key certificates to validate the identity of a client and a server. The principals validate each other’s certificates by comparing the digital signature of the ...
Last month, I described the new wireless LAN security protocol, Wi-Fi Protected Access (WPA). I showed how it adds strong and flexible authentication, plus dynamic encryption-key negotiation, to the ...
Developers behind FreeRADIUS, an open source implementation of the networking protocol RADIUS, are encouraging users to update to address an authentication bypass found in the server. Developers ...
Last month, I covered the 802.11 wireless standard and the various options available for wireless networking. This time, let’s look at the principles of securing ...