answersLogoWhite

0

Port-based authentication is a form of "security by obscurity" wherein any device connecting to a system via the selected port is assumed to have authority to access said system. This can be dangerous if the port is randomly guessed, or shared by an someone who has previously been authorized. In this way, port-based authentication is equivalent to using a weak (or even default) password.

User Avatar

Wiki User

12y ago

What else can I help you with?

Related Questions

What requires port-based authentication?

RADIUS requires port-based authentication.


Does radius require port-based authentication?

Yes, RADIUS requires port-based authentication.


Does kerberos require port based authentication?

No


Whart are the different web authentication mechanism?

The most common form of authentication is the password based authentication


How many types of authorization and authentication provided by ASP.net?

Authentication !) form based Authentication 2) Windows " " 3) Passport "


What is the standard TCP port used for Kerberos authentication traffic in the US?

88 ??


What method of authentication requires a smart card and a PIN to provide more secure access to company resources?

two-factore authentication


What is the portrays authentication based on something the user has?

An ID card portrays authentication based upon something the user has.


Which type of device is required to implement port authentication through a switch?

RADIUS server


WHAT ARE THE Three ways to authenticate someone?

Three common ways to authenticate someone are: Knowledge-based authentication: This involves something the user knows, such as a password or PIN. Possession-based authentication: This requires something the user has, like a security token, smart card, or mobile device for SMS verification. Biometric authentication: This uses unique biological traits, such as fingerprints, facial recognition, or iris scans, to verify a person's identity.


What is authentication based upon?

Authentication is based upon either:Something you know (such as a PIN).Something you have (such as an ID card).Something you are (such as a fingerprint, retina scan or DNA sample).Preferably, authentication will combine two or more of the three.


What is the difference between using open authentication and pre-shared keys?

Open authentication requires a password. Pre-shared keys do not require a password.