Describe 802.1x authentication.

What will be an ideal response?

802.1x authentication involves three main participants: the supplicant, authenticator, and authentication server. The supplicant is the station that requests access through the authenticator, which is usually an AP in wireless networks. The authenticator passes the request to the authentication server, which stores the credentials of authorized users. An important strength of 802.1x is that the supplicant never communicates directly with the authentication server, thus reducing the chance of compromising sensitive data stored on the server.

Computer Science & Information Technology

You might also like to view...

It is possible to change the format of one cell individually

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following data structures does not yield an efficient sort?

a. STL set b. stack c. priority queue d. all can be used for efficient sorting e. none can be used for efficient sorting

Computer Science & Information Technology