[ << ] | [ < ] | [ Up ] | [ > ] | [ >> ] | [Top] | [Contents] | [Index] | [ ? ] |
4.3 Shared-key and anonymous authentication
In addition to certificate authentication, the TLS protocol may be used with password, shared-key and anonymous authentication methods. The rest of this chapter discusses details of these methods.
4.3.1 SRP authentication | ||
4.3.2 PSK authentication | ||
4.3.3 Anonymous authentication |
This document was generated on February 9, 2014 using texi2html 5.0.