answersLogoWhite

0


Best Answer

It depends. For robust and high risk system, Lightweight Directory Access Protocol (LDAP) authentication, or client-side public key infrastructure authentication.

User Avatar

Wiki User

13y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What technology is used for authentication users?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Why is two factor authentication used?

Two factor authentication is used so that users on a network or even private users don't have their accounts hacked or broken into as easily with just a single passwords based system.


A technician wishes to secure the network authentication for all remote users Which security technology uses radio communication with a computer before accepting a username and password?

A technician wishes to secure the network authentication for all remote users. Key fobs is a security technology that uses radio communication with a computer before accepting a username and password.


What is the technology which is used to measure and analyze human body characteristics for authentication purposes?

biometric


What is a method for confirming users identities?

Authentication


What is a vulnerability of cookies?

B: They could be used to capture authentication information of users to gain access to their accounts


What is the purpose of the network security authentication function?

To require users to prove who they are


What is Passport Authentication in Aspnet?

It is a centralized authentication service provided by Microsoft.This method of authentication uses Microsoft's Passport service to authenticate users. When you use Passport authentication, a user must have a valid Passport account to access the application.


What is an authenticated users?

An authenticated users are those who have passed the identification/authentication process of a particular system and are able to log-on in that system.


What services does Centrify offer?

Centrify can offer a variety of services for Information Technology businesses and technology dependent companies. Centrify offers authentication and network identity management services for different users that are running different operating systems in a single unified enterprise environment.


What is social electricity?

Electricity used to send or socialize with other technology users.


Which wireless technology provides mutual two way authentication?

UMTS


Which authentication protocols must communicate with an AAA server to authenticate users?

TACACS+ and RADIUS