TACACS+ and RADIUS
Mutual Authentication
MS-CHA
CHAP (Challenge Handshake Authentication Protocol) The CHAP provides protection against palyback attack by the peer also requires both the client and server.
Most Linux distributions come with several PAM authentication modules, including modules that support authentication to an LDAP directory and authentication using Kerberos. You can use these modules to authenticate to Active Directory, but there are some significant limitations.
Any Domain controller (server in the domain and ad installed on it) can authrorize and authenticate the user. If there is any password related issue, the information is sent to the PDC.There is one PDC role holder server in the domain which delegates other DCs to authorirze and authenticate in domain
I think one is database server authentication, the other is operating system level authentication (could be at the network level).
SQL Authentication Windows Authentication (Domain)
Identify the form of attack where a valid transmission is recorded to later be used to fraudulently authenticate to a server.
Possible approaches: (1) based on the MAC address of wireless host (2) user name /password combination. In both cases AP relays information to an authentication server
EAP
A full service kerberos environment consisting of kerberos server and clients and application servers requires kerberos server to maintain a database containing users name and their hashed password and realm sets up aboundary within which authentication server can authenticate users. In general we can say realm is set of nodes sharing a common database.
TLS Authentication ensures that both a server and client know who they are communicating with.