MS-CHAP is dead MS-CHAP has been in use since 1998. It was Microsoft's answer to the challenge of authenticating users over networks, built into every version of Windows and deeply embedded in VPN and Wi-Fi infrastru... Network Security Best Practices Network Security Protocols
Build what you need Your authentication system goes down because the licensing server is unreachable. This happens more than you'd think. ByAlan DeKok, CEO, InkBridge Networks Your authentication server goes down during ... Network Security Best Practices Network Security Protocols
We toppled a $500 million industry with free software Why your "enterprise-grade" million-dollar solution is getting outmaneuvered by free software running on commodity hardware by Alan DeKok, CEO Twenty-five years ago, I started building FreeRADIUS in m... Network Security Best Practices Network Security Protocols
My FreeRADIUS server is slow. What's wrong? If you are encountering performance issues with FreeRADIUS, the first thought is usually to blame FreeRADIUS. In fact, it’s always the database which is the source of a system slowdown . Well, maybe n... Network Security Best Practices
Exposed: National Public Data breach makes a nation’s secrets public The hacking of 270 million social security numbers from National Public Data reinforces the best practice for personal data: always encrypt PII. The cat is out of the bag for National Public Data. In ... Network Security Best Practices
RADIUS password compatibility This article covers password storage compatibility for RADIUS deployments. You'll findan overview of how the RADIUS protocol works here. In order for RADIUS authentication to work, user passwords need... Network Security Best Practices Network Security Protocols