Authentication at the Network Edge

In order to protect themselves in a growing attack landscape, companies must employ defensive security techniques and evaluate if they’re doing enough to prevent bad actors from accessing their networks. In this post, we’ll discuss types of authentication that allow companies to verify access to both users and devices at the network edge.

Types of Authentication

Before we explore the options, we have to consider the context. Authenticating users and devices are wildly different based on capabilities and use cases. Authentication into an application will likely require a username and password or federated authentication with an identity provider for single sign-on (SSO). Alternatively, authenticating a device doesn’t involve a user and is limited to the context and information the device has at runtime. 

This article has been indexed from DZone Security Zone

Read the original article: