Authentication and Authorization:The Big Picture with IEEE 802.1X
نویسنده
چکیده
Current authentication protocols (i.e. user login and password) successfully restrict access to properly configured workstations and servers. Traditionally, a user’s privileges will allow (or deny) access to files or applications on the local machine or on other machines within its domain. Yet, authorized access to a particular machine (or domain) does not necessarily correlate with access to privileged network services. That is, a given computer is unable to grant differential network privileges (on a large scale) to different users. For example, a user and an administrator could independently login to the same workstation. The administrator may require enhanced network service access (such as outside FTP or access to a particular VLAN). Nevertheless, under traditional authentication protocols, neither the computer nor the network switch to which it is connected will be able to independently grant the administrator enhanced access to these network services.
منابع مشابه
Comparative Analysis of IEEE 802.1x Authentication Methods
The IEEE Standard 802.11 is one of the most widely adopted mechanisms for WLANs, it provides comprehensive guidelines for their operational smoothness. 802.11 suffered from limited data confidentiality and cumbersome procedure for exchange of security parameters. In response to the security limitations in 802.11, IEEE introduced 802.1x for authentication and key management. The 802.1x is a port...
متن کاملIEEE 802.1X Remote Authentication Dial In User Service (RADIUS) Usage Guidelines
This document provides suggestions on Remote Authentication Dial In User Service (RADIUS) usage by IEEE 802.1X Authenticators. The material in this document is also included within a non-normative Appendix within the IEEE 802.1X specification, and is being presented as an IETF RFC for informational purposes. Congdon, et al. Informational [Page 1] RFC 3580 IEEE 802.1X RADIUS September 2003 Table of
متن کاملCertificate Extensions and Attributes Supporting Authentication in Point-to-Point Protocol (PPP) and Wireless Local Area Networks (WLAN)
Several Extensible Authentication Protocol (EAP) [EAP] authentication methods employ X.509 public key certificates. For example, EAP-TLS [EAP-TLS] can be used with PPP [PPP] as well as IEEE 802.1X [802.1X]. PPP is used for dial-up and VPN environments. IEEE 802.1X defines port-based, network access control, and it is used to provide authenticated network access for Ethernet, Token Ring, and Wir...
متن کاملPPP and WLAN May
Several Extensible Authentication Protocol (EAP) [EAP] authentication methods employ X.509 public key certificates. For example, EAP-TLS [EAP-TLS] can be used with PPP [PPP] as well as IEEE 802.1X [802.1X]. PPP is used for dial-up and VPN environments. IEEE 802.1X defines port-based, network access control, and it is used to provide authenticated network access for Ethernet, Token Ring, and Wir...
متن کاملEnhanced Security Evaluation and Analysis of Wireless Network based on MAC Protocol
IEEE 802.11-2007 Standard for wireless network classifies security algorithms into: RSNA and Pre-RSNA. PreRSNA algorithms are the algorithms used before RSNA. PreRSNA security comprises the algorithms; WEP (Wired Equivalent Privacy) and IEEE 802.11 entity authentication. RSNA security comprises the algorithms like TKIP, CCMP, RSNA establishment and termination procedures, including use of IEEE ...
متن کامل