AAA Principles and Configuration
| Institution | Jomo Kenyatta University of Science and Technology |
| Course | Bsc. Computer Scienc... |
| Year | 2nd Year |
| Semester | Unknown |
| Posted By | Chris |
| File Type | |
| Pages | 13 Pages |
| File Size | 574.08 KB |
| Views | 137 |
| Downloads | 0 |
| Price: |
Buy Now
|
Description
On completion of this course, you will be able to:
Understand the fundamentals of AAA.
Describe the application scenarios of AAA.
Understand the fundamentals of RADIUS.
Get familiar with the basic configurations of AAA.
Below is the document preview.
13. AAA Principles and Configuration
Trending!
User management is one of the most basic security management requirements for
any network. Authentication, authorization, and accounting (AAA) is a management framework that provides a security mechanism for authorizing some users to access specified resources and recording the operations of these users. AAA is widely used because of its good scalability and easy implementation of centralized management of user information. AAA can be implemented through multiple protocols. In actual applications, the Remote Authentication Dial-In User Service (RADIUS) protocol is the most commonly used to implement AAA.
This course describes the basic concepts, implementation, basic configurations, and
typical application scenarios of AAA.
21 Pages
2115 Views
0 Downloads
869.21 KB