Wireless User Authentication

Free registration required

Executive Summary

Authentication enables administrators to identify the users connecting to a wireless network. Authentication can be at the device level (blocking or allowing a MAC address) or at the user level (validating a username and password). Compared to user authentication, device authentication is trivial (and insecure, since MAC addresses can be spoofed). This white paper focuses on robust, secure, and easy-to-implement techniques for wireless user authentication.

  • Format: PDF
  • Size: 377.21 KB