A Survey of Authentication Mechanisms
draft-iab-auth-mech-07
| Document | Type |
Expired Internet-Draft
(iab)
Expired & archived
|
|
|---|---|---|---|
| Authors | Eric Rescorla , Gregory M. Lebovitz | ||
| Last updated | 2024-12-18 (Latest revision 2010-02-27) | ||
| RFC stream | Internet Architecture Board (IAB) | ||
| Intended RFC status | Informational | ||
| Formats | |||
| Stream | IAB state | (None) | |
| Consensus boilerplate | Unknown | ||
| IAB shepherd | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
Authentication is a common security issue for the design of Internet protocols. A wide variety of authentication technologies are available. A common problem is knowing which technology to choose or which of a variety of essentially similar implementations of a given technique to choose. This memo provides a survey of available authentication mechanisms and guidance on selecting one for a given protocol.
Authors
Eric Rescorla
Gregory M. Lebovitz
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)