A Survey of Authentication Mechanisms
draft-iab-auth-mech-07
Document | Type |
Expired Internet-Draft
(iab)
Expired & archived
|
|
---|---|---|---|
Authors | Eric Rescorla , Gregory M. Lebovitz | ||
Last updated | 2015-10-14 (Latest revision 2010-02-27) | ||
RFC stream | Internet Architecture Board (IAB) | ||
Intended RFC status | Informational | ||
Formats | |||
Stream | IAB state | (None) | |
Consensus boilerplate | Unknown | ||
IAB shepherd | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
Authentication is a common security issue for the design of Internet protocols. A wide variety of authentication technologies are available. A common problem is knowing which technology to choose or which of a variety of essentially similar implementations of a given technique to choose. This memo provides a survey of available authentication mechanisms and guidance on selecting one for a given protocol.
Authors
Eric Rescorla
Gregory M. Lebovitz
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)