In many organizations, there are diverse devices that all need some type of standardized authentication methods. Fortunately, the IT industry has created these AAA methods using technologies such as RADIUS and TACACS.
<< Previous Video: An Overview of KerberosNext: Network Access Control with 802.1X >>