Next: Selecting an appropriate authentication method, Previous: More on certificate authentication, Up: Authentication methods [Contents][Index]
In addition to certificate authentication, the TLS protocol may be used with password, shared-key and anonymous authentication methods. The rest of this chapter discusses details of these methods.
• SRP authentication: | ||
• PSK authentication: | ||
• Anonymous authentication: |