[ << ] | [ < ] | [ Up ] | [ > ] | [ >> ] | [Top] | [Contents] | [Index] | [ ? ] |
5 Shared-key and anonymous authentication
In addition to certificate authentication, the TLS protocol may be used with password, shared-key and anonymous authentication methods. The rest of this chapter discusses details of these methods.
5.1 SRP authentication | ||
5.2 PSK authentication | ||
5.3 Anonymous authentication |
This document was generated on March 2, 2012 using texi2html 5.0.