answersLogoWhite

0


Best Answer

SSO (single sign on) allows a person to access all the resources they need after they have authenticated once.

User Avatar

Wiki User

13y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Which authentication model should you implement to ensure that once users are authenticated with their username and password they are able to access all the resources they need on the network?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What is IP based authentication?

user and organizations can be authenticated upon their IP-address without having to enter username and password


Whart are the different web authentication mechanism?

The most common form of authentication is the password based authentication


The password authentication protocol is a simple authentication protocol that is very secure?

false


Which should you implement to increase the dial-in security?

CallbackAuthenticationAnswer Explanation: To increase dial-in security, you should implement callback and authentication. Network hosts that allow modem dial-in can present a security risk since they provide a way into the network that bypasses firewalls. To increase dial-in security, you should use a secure authentication protocol that requires a username and password.


What does SPA stand for?

Secure Password Authentication


What is the difference between using open authentication and pre-shared keys?

Open authentication requires a password. Pre-shared keys do not require a password.


What is the highest level of security during login?

During login to any account authentication is used. In authentication the user password is matched with the password in the database.


Authentication of accounting records?

* Authentication is the process of identifying an individual, usually based on a username and password. Authentication is based on the idea that each individual user will have unique information that sets him or her apart from other users. * Authorization is the process of granting or denying a user access to network resources once the user has been authenticated through the username and password. The amount of information and the amount of services the user has access to depend on the user's authorization level. * Accounting is the process of keeping track of a user's activity while accessing the network resources, including the amount of time spent in the network, the services accessed while there and the amount of data transferred during the session. Accounting data is used for trend analysis, capacity planning, billing, auditing and cost allocation * Authentication is the process of identifying an individual, usually based on a username and password. Authentication is based on the idea that each individual user will have unique information that sets him or her apart from other users. * Authorization is the process of granting or denying a user access to network resources once the user has been authenticated through the username and password. The amount of information and the amount of services the user has access to depend on the user's authorization level. * Accounting is the process of keeping track of a user's activity while accessing the network resources, including the amount of time spent in the network, the services accessed while there and the amount of data transferred during the session. Accounting data is used for trend analysis, capacity planning, billing, auditing and cost allocation


Varificatin of a login name and password is known as?

Authentication


What is the most common form of authentication?

Username/ password


What is the most common form of authentication used?

Username/ password


What encryption protocol does Windows XP use when sending an account name and password to a domain controller for validation?

Windows 2000/XP uses Kerberos. A+ Guide to managing and maintaing you PC pg. 1035 Winddows xp used to authentication protocol to enctypt account name and password . the most popular protocols are Challenge handshake authentication protocol and kerberos is the default used by windows 2000/ xp . When the user login to the network the username and the password must passed over the network in order to be authenticated by the domain controller.