J4 ›› 2008, Vol. 30 ›› Issue (5): 26-28.
• 论文 • Previous Articles Next Articles
Online:
Published:
Abstract:
As for the illegal access threats from the Intranet during the enterprise IT management, the paper gives a scheme of realizing legal access authentica tion and management , which combines the 802. 1x protocol and the Active Directory. Then,we give a specific case analysis to expatiate on the unified au thentication process and merits of the Windows domain and 802. 1x.
Key words: 802. lx protocol, user authentication, Active Diretory, intranet security
0 / / Recommend
Add to citation manager EndNote|Ris|BibTeX
URL: http://joces.nudt.edu.cn/EN/
http://joces.nudt.edu.cn/EN/Y2008/V30/I5/26