Challenge Phrase Authentication
Hewlett-Packard Company Virtual Private Networking Concepts Guide
4-3
Challenge Phrase Authentication
Challenge Phrase Authentication
Challenge Phrase Authentication
Challenge Phrase Authentication
Authentication using challenge phrases is very similar to
authentication using certificates. The difference is that a
certificate authority is not present to create and certify a
certificate. Therefore, the VPN devices must create a certificate
for themselves. This type of certificate is essentially the same as
a certificate generated by a certificate authority except that the
digital signature is encrypted with a challenge phrase rather than
with the private key of the certificate authority. The implication
is that when two devices attempt to authenticate each other for
the first time, they must both know the challenge phrase of the
other device. Therefore, the challenge phrase for a particular
device must be input on the device and must also be input on any
other device with which it needs to communicate.
Related
Related
Related
Related
Information
Information
Information
Information
SecurID Authentication (page 4-4)
RADIUS Authentication (page 4-5)
Entrust Authentication (page 4-6)