A security analyst needs to centrally manage credentials and permissions to the company’s network devices. The following security requirements must be met:
• All actions performed by the network staff must be logged.
• Per-command permissions must be possible.
• The authentication server and the devices must communicate through TCP.
Which of the following authentication protocols should the analyst choose?
ApplebeesWaiter1122
Highly Voted 1 year, 12 months agoApplebeesWaiter1122
1 year, 12 months agoganymede
Highly Voted 2 years, 2 months agoMarleigh
Most Recent 11 months, 3 weeks agoNavigator
1 year, 11 months agofryderyk
2 years agosmez
2 years, 2 months agoUfuk_Ari
2 years, 3 months agosdc939
2 years, 3 months agohsdj
2 years, 3 months agohsdj
2 years, 3 months agosdc939
2 years, 3 months ago