Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

AAA (Authentication, Authorisation and Accounting)

Posted on 2009-06-29
2
Medium Priority
?
343 Views
Last Modified: 2012-05-07
Hie.

Can someone please point me to resources where i can understand what AAA is. Is it a protocol? If so....what is tacacs and radius? How does protocols such as PPP fit into the picture? Kerberos etc. Im lost and dont understand what AAA is.
0
Comment
Question by:yolunga2000
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 7

Accepted Solution

by:
rcflyr earned 200 total points
ID: 24738211
AAA sort of a set of guidelines rather than a specific protocol.  You can read the RFCs listed here for specific information (good bed time reading)
http://en.wikipedia.org/wiki/AAA_protocol

RADIUS and TACACS use the concepts in the AAA RFCs to accomplish the task.
http://en.wikipedia.org/wiki/RADIUS
http://en.wikipedia.org/wiki/TACACS

You might also want to read (RADIUS Replacement):
http://en.wikipedia.org/wiki/Diameter_(protocol)
0

Featured Post

Enroll in October's Free Course of the Month

Do you work with and analyze data? Enroll in October's Course of the Month for 7+ hours of SQL training, allowing you to quickly and efficiently store or retrieve data. It's free for Premium Members, Team Accounts, and Qualified Experts!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this article, WatchGuard's Director of Security Strategy and Research Teri Radichel, takes a look at insider threats, the risk they can pose to your organization, and the best ways to defend against them.
What monsters are hiding in your child's room? In this article I will share with you a tech horror story that could happen to anyone, along with some tips on how you can prevent it from happening to you.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

610 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question