OpenSecEd / auth

A learning module on Authentication
1 stars 1 forks source link

Areas in authentication: user-to-machine, machine-to-user, user-to-user, machine-to-machine #6

Open dbosk opened 7 years ago

dbosk commented 7 years ago

The area of authentication that we are interested in can be divided into these categories:

dbosk commented 7 years ago

User--machine and machine--user authentication are discussed in overview. The machine-to-machine authentication is basically the main topic of fverifprotocols, that should move here.

dbosk commented 5 years ago

Machine-to-machine might also be covered by keyauth.

dbosk commented 5 years ago

These are usually chained when using crypto and involving hardware.

dbosk commented 4 years ago

User-to-user (through-machine) will probably require distance bounding in some cases.