A Survey of Authentication Mechanisms

Document Type Expired Internet-Draft (iab)
Authors Eric Rescorla  , Gregory Lebovitz 
Last updated 2015-10-14 (latest revision 2010-02-27)
Stream IAB
Intended RFC status Informational
Expired & archived
pdf htmlized (tools) htmlized bibtex
Stream IAB state (None)
Consensus Boilerplate Unknown
RFC Editor Note (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at


Authentication is a common security issue for the design of Internet protocols. A wide variety of authentication technologies are available. A common problem is knowing which technology to choose or which of a variety of essentially similar implementations of a given technique to choose. This memo provides a survey of available authentication mechanisms and guidance on selecting one for a given protocol.


Eric Rescorla (ekr@rtfm.com)
Gregory Lebovitz (gregory.ietf@gmail.com)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)