When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. What is the difference between a RADIUS server and Active...

    security.stackexchange.com/questions/130095

    A RADIUS server is a server or appliance or device that receives authentication requests from the RADIUS client and then passes those authentication requests on to your identity management system. It's a translator that helps your devices communicate with your identity management system when they don't natively speak the same language.

  3. What's the difference between Radius and Kerberos?

    security.stackexchange.com/.../whats-the-difference-between-radius-and-kerberos

    9. Radius task/purpose is to authenticate you at the specific point, i.e. in a web interface or pptp dialup-like server. Every point that needs authentication does a query to a Radius server for your credentials like login and password. Kerberos task/purpose is to distribute a trust to your session to all points connected/registered : you're ...

  4. Should you use Radius and LDAP together?

    security.stackexchange.com/questions/130203

    1. LDAP is a database with user information (including passwords). Radius is a protocol for authentication (and other things) but does not contain any user information by itself. This means you could use Radius to authenticate against various kinds of password storage, including an LDAP database. Support for Radius can be found in lots of ...

  5. freeradius - What can I do with a radius shared secret? -...

    security.stackexchange.com/questions/166420

    The RADIUS client and server use the shared secret to encrypt the password. If you know the shared secret, and you can capture RADIUS packets with encrypted passwords, you can decrypt them and get the user's unencrypted password. Wireshark includes the ability to do this, of course:

  6. Do I need both a CA Certificate and a Server Certificate on a...

    security.stackexchange.com/questions/139339

    said " My RADIUS server uses wifi-server-cert as the SSL certificate, and uses the wifi-client-ca certificate authority for validating client certificates." Can someone tell me: Is it necessary (or advantageous) to use both a Server certificate and a CA Certificate on a Radius Server.(or do I have my wires crossed!)

  7. How are RADIUS packets encrypted? [duplicate]

    security.stackexchange.com/questions/216321/how-are-radius-packets-encrypted

    1. RADIUS by itself provides no encryption of all traffic. It protects only a small part of the traffic, notably the passwords. To cite from Wikipedia: Radius - Security: The RADIUS protocol transmits obfuscated passwords using a shared secret and the MD5 hashing algorithm. ... additional protection, such as IPsec tunnels or physically secured ...

  8. cisco - Are RADIUS and TACACS+ Ever Allowed in FIPS 140-2...

    security.stackexchange.com/questions/44388/are-radius-and-tacacs-ever-allowed...

    It provides a FIPS-certifiable means for the Cisco Access Control Server (ACS) to authenticate RADIUS messages and distribute session keys. RADIUS keywrap increases RADIUS protocol security by using the Advanced Encryption Standard (AES) keywrap algorithm to transfer keys while an HMAC-SHA1 algorithm is used to protect packet integrity.

  9. radius - Using LetsEncrypt certificates for WiFi network...

    security.stackexchange.com/questions/218453

    Since your private domain is likely not the domain of the radius server you cannot reuse your certificate there. Apart from that it is a bad idea to give your secret key to the school, since this is what you would need to do in order to use your existing certificate on their radius server.

  10. How does the EAP-TLS handshake work, exactly?

    security.stackexchange.com/questions/239204/how-does-the-eap-tls-handshake...

    In EAP-TLS, the peer (supplicant) and the authenticator do a TLS handshake. In practice, the authenticator usually relays the EAP mesages to an authentication (RADIUS) server which means that the TLS handshake is actually done between the supplicant and the authorization server.

  11. group policy - How to verify if a RADIUS server certificate is...

    security.stackexchange.com/questions/203349

    Connect to these servers: radius\.example\.com; Trusted Root Certification Authorities: [x] radius.example.com (alone) Do not prompt user to authorize new servers or trusted certification authorities Enabled. It's assumed that clients wouldn't authenticate against any RADIUS servers not signed by the radius.example.com on any evil twin AP ...