answersLogoWhite

0

It depends. For robust and high risk system, Lightweight Directory Access Protocol (LDAP) authentication, or client-side public key infrastructure authentication.

User Avatar

Wiki User

15y ago

What else can I help you with?

Related Questions

Why is two factor authentication used?

Two factor authentication is used so that users on a network or even private users don't have their accounts hacked or broken into as easily with just a single passwords based system.


What is the most common form of authentication used?

The most common form of authentication used is username and password authentication. Users are required to enter a unique username and a corresponding password to access their accounts or systems.


A technician wishes to secure the network authentication for all remote users Which security technology uses radio communication with a computer before accepting a username and password?

A technician wishes to secure the network authentication for all remote users. Key fobs is a security technology that uses radio communication with a computer before accepting a username and password.


What is a method for confirming users identities?

Authentication


What is a vulnerability of cookies?

B: They could be used to capture authentication information of users to gain access to their accounts


What is the purpose of the network security authentication function?

To require users to prove who they are


What is Passport Authentication in Aspnet?

It is a centralized authentication service provided by Microsoft.This method of authentication uses Microsoft's Passport service to authenticate users. When you use Passport authentication, a user must have a valid Passport account to access the application.


What is an authenticated users?

An authenticated users are those who have passed the identification/authentication process of a particular system and are able to log-on in that system.


What is the technology which is used to measure and analyze human body characteristics for authentication purposes?

Biometric technology is used to measure and analyze human body characteristics for authentication purposes. This can include fingerprints, facial recognition, iris scans, voice recognition, and more. It provides a secure and convenient way to verify a person's identity.


What services does Centrify offer?

Centrify can offer a variety of services for Information Technology businesses and technology dependent companies. Centrify offers authentication and network identity management services for different users that are running different operating systems in a single unified enterprise environment.


What is social electricity?

Electricity used to send or socialize with other technology users.


Which wireless technology provides mutual two way authentication?

UMTS