Connected: An Internet Encyclopedia
6. AUTHENTICATION

Up: Connected: An Internet Encyclopedia
Up: Requests For Comments
Up: RFC 1831
Prev: 5. BINDING AND RENDEZVOUS INDEPENDENCE
Next: 7. RPC PROTOCOL REQUIREMENTS

6. AUTHENTICATION

6. AUTHENTICATION

The RPC protocol provides the fields necessary for a client to identify itself to a service, and vice-versa, in each call and reply message. Security and access control mechanisms can be built on top of this message authentication. Several different authentication protocols can be supported. A field in the RPC header indicates which protocol is being used. More information on specific authentication protocols is in section 9: "Authentication Protocols".


Next: 7. RPC PROTOCOL REQUIREMENTS

Connected: An Internet Encyclopedia
6. AUTHENTICATION