MS-CHAP is dead MS-CHAP has been in use since 1998. It was Microsoft's answer to the challenge of authenticating users over networks, built into every version of Windows and deeply embedded in VPN and Wi-Fi infrastru... Network Security Best Practices Network Security Protocols
Why open-source software wins at proof of concept Here's why open source changes everything about proof-of-concept testing. ByAlan DeKok, CEO, InkBridge Networks I've watched a lot of CTOs react to technical demonstrations over 25 years. Most nod pol... Network Security Best Practices Network Security Protocols
Build what you need Your authentication system goes down because the licensing server is unreachable. This happens more than you'd think. ByAlan DeKok, CEO, InkBridge Networks Your authentication server goes down during ... Network Security Best Practices Network Security Protocols
InkBridge Networks in 2025 2025 is the year InkBridge Networks launched the world's first RADIUS conference and championed critical standards work, reinforcing our position as the authentication experts the industry turns to wh... Network Security Protocols
The RADIUS protocol: How it works and why it's secure Learn how security-by-design improvements have transformed RADIUS into a more secure protocol than the expensive platforms built on top of it. “Is RADIUS secure?” is one of the most common questions n... Network Security Best Practices Network Security Protocols
Most ISPs Hit a Scalability Wall at 100,000 Subscribers—This Webinar Shows You How to Architect for Millions FOR IMMEDIATE RELEASE Jana Sedivy InkBridge Networks jana.sedivy@inkbridgenetworks.com InkBridgeNetworks.com OTTAWA, CANADA – October 17, 2025 When an ISP goes down in the middle of the night, it’s no... Network Security Protocols
It’s Finally Time to Replace NTLM With Microsoft deprecating MS-CHAP and NTLM, it’s time for enterprise networks to switch to a more secure authentication method: TTLS. Microsoft is finally deprecating its 30-year-old MS-CHAP and NTLM... Network Security Protocols
How does RADIUS Accounting work? RADIUS accounting is a critical component of the RADIUS protocol that collects data for statistical purposes, network monitoring, and accurate billing of users. This process works alongside RADIUS aut... Network Security Protocols
How does RADIUS Authorization work? During the process where the user requests access to the RADIUS server, RADIUS authorization and authentication happen simultaneously. An “authentication request” occurs when the Network Access Server... Network Security Protocols
Can you use FreeRADIUS and Active Directory together? The short answer is Yes, FreeRADIUS and Active Directory arecompatible with each other . However, there are some constraints and implications for the rest of the system. Like any technology choice, Ac... Network Security Best Practices Network Security Protocols
Configuring FreeRADIUS authentication with PAP (Password Authentication Protocol) Introduction to PAP authentication Password Authentication Protocol (PAP) is one of the most fundamental authentication methods used in Remote Authentication Dial-In User Service (RADIUS). Despite bei... Network Security Best Practices Network Security Protocols
Common FreeRADIUS debug messages If you’re just getting started with FreeRADIUS, it can sometimes seem overwhelming when you run into problems. To the beginner, FreeRADIUS looks complex, but the debug troubleshooting information help... Network Security Best Practices Network Security Protocols