227k views
4 votes
We are implementing a server with indirect authentication. What is included in the security boundary

User Pigueiras
by
6.1k points

1 Answer

4 votes

Answer:

An AAA services protocol like RADIUS and TACACS+

Step-by-step explanation:

In computer networking, security is essential, preventing malicious users from accessing the information on the network.

Enterprise networks implement authentication, authorization, and accounting using AAA services protocols like RADIUS and TACACS+ in the network server to grant access to members or authorized users of the enterprise. The server holds information that should be confidential to only a group of authorized users

User Ccoxtn
by
5.4k points