Back to T5.4.2 - P1 -USER AUTHENTICATION FOR EXTERNAL CONNECTIONS
Authentication of remote users can be achieved using, for example, a cryptographic based technique, hardware tokens, or a challenge/response protocol. Possible implementations of such techniques can be found in various virtual private networks (VPN solutions). Dedicated private lines can also be used to provide assurance of the source of connections.
Node authentication can serve as an alternative means of authenticating groups of remote users where they are connected to a secure, shared computer facility. Cryptographic techniques, e.g. based on machine certificates, can be used for node authentication. This is part of several VPN based solutions.
Back to T5.4.2 - P1 -USER AUTHENTICATION FOR EXTERNAL CONNECTIONS