Table of contents
Combined revision comparison
...
User authentication methods that can be used include the following. For details see #2.2User Authentication#..
- Anonymous authentication
Anonymous authentication allows connection as long as at least the user name is known, and is used when establishing widely offered Virtual Hub service, etc. It is not usually used for businesses, etc. - Password Authentication
Standard password authentication is the method of conducting user authentication by user name and password and is the method for which security can be most easily maintained. Users can also change the password themselves using VPN Client. The password is hashed when typed in and because password confirmation is conducted by challenge and response when authenticating, the password and hash data do not flow on the network. - RADIUS server authentication
Method of user authentication using RADIUS authentication server already owned by company, etc. - NT domain and Active Directory authentication
Method of user authentication using Windows NT main controller or Active Directory of user database of Windows Server2000 / Server 2003already owned by company, etc. - Certificate authentication (PKI authentication)
Method of user authentication whereby those connected to VPN are identified by mathematically calculating whether or not those connected have a private key by having those connected to VPN present a client certificate to VPN Server. Because a fixed character string such as password is not used, it is the most secure method of user authentication.
...
Server certificate verification is conducted by the connection source software side such as cascade connected VPN Server or VPN Bridge or VPN Client connected to remote VPN Server by usual method. For details on server certificate verification, see #4.4.5#,4.4 Making Connection to VPN Server, etc.
...
For information on how to use the user authentication function using a smart card, see #4.6Using and Managing Smart Cards#..
...
Version from 02:58, 2 Mar 2013
...
User authentication methods that can be used include the following. For details see #2.2#.
- Anonymous authentication
Anonymous authentication allows connection as long as at least the user name is known, and is used when establishing widely offered Virtual Hub service, etc. It is not usually used for businesses, etc. - Password Authentication
Standard password authentication is the method of conducting user authentication by user name and password and is the method for which security can be most easily maintained. Users can also change the password themselves using VPN Client. The password is hashed when typed in and because password confirmation is conducted by challenge and response when authenticating, the password and hash data do not flow on the network. - RADIUS server authentication
Method of user authentication using RADIUS authentication server already owned by company, etc. - NT domain and Active Directory authentication
Method of user authentication using Windows NT main controller or Active Directory of user database of Windows2000 / Server 2003already owned by company, etc. - Certificate authentication (PKI authentication)
Method of user authentication whereby those connected to VPN are identified by mathematically calculating whether or not those connected have a private key by having those connected to VPN present a client certificate to VPN Server. Because a fixed character string such as password is not used, it is the most secure method of user authentication.
...
Server certificate verification is conducted by the connection source software side such as cascade connected VPN Server or VPN Bridge or VPN Client connected to remote VPN Server by usual method. For details on server certificate verification, see #4.4.5#, etc.
...
For information on how to use the user authentication function using a smart card, see #4.6#.
...
Version as of 00:36, 3 Mar 2013
...
User authentication methods that can be used include the following. For details see 2.2User Authentication.
...
Server certificate verification is conducted by the connection source software side such as cascade connected VPN Server or VPN Bridge or VPN Client connected to remote VPN Server by usual method. For details on server certificate verification, see 4.4 Making Connection to VPN Server, etc.
...
For information on how to use the user authentication function using a smart card, see 4.6Using and Managing Smart Cards.
...