Kerberos

Kerberos

Kerberos• Kerberos: This validation protocol provides robust authentication for client-server-based applications through encryption with secret keys. Kerberos assumes that all endpoints within a network are insecure. It therefore enforces strong encryption for all...

Ports

The known portThe known port numbers Similar to IP addresses, ports are also divided into classes. There are three port ranges: the known ports, the registered ports and the dynamic / private ports. The assignment of port numbers, the regional assignment of IP...
Kerberos

SSL

Secure Sockets Layer (SSLSecure Sockets Layer (SSL): SSL is a standard protocol for encryption and security. It provides a secure and encrypted connection between the computer and the target server or device accessed over the Internet.): SSLSecure Sockets Layer (SSL):...
2FA – Two-Step Authentication (MFA)

2FA – Two-Step Authentication (MFA)

Two-factor authentication is a mechanism that allows users to verify an attempt to authenticate. The user must provide a one-time code to confirm authentication that is sent to their device. This code is sent, for example, via text message or generated by a code via...

SSH

Secure Shell (SSHSecure Shell (SSH): SSH is a cryptographic network security protocol that provides a secure cross-network data connection. SSH is used to support command line execution of instructions, including remote authentication of servers. The FTP protocol uses...
Skip to content