![]() ![]() The RADIUS either sends an Accept or Denial of access which is passed back through the AP to the user attempting to connect. That information is relayed to the RADIUS server which can use a couple of methods to determine if the credentials are valid and if the user is authorized for access to the network. The user or device requesting network access sends their key, typically either a credential (such as passwords) or a digital certificate to the Access Point they are attempting to connect to. The diagram below is a simple, yet thorough, illustration of the steps that make up 802.1X authentication (for any operating system). 802.1X is the name of a family of authentication protocols that protect wired or wireless authentication by opening a secure network access port for authorized users. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |