Mutual chap user access: Difference between revisions
Jump to navigation
Jump to search
migrate>Un-K Created page with "This function enables bi-directional authentication. It additionally enables the initiator to authenticate the target." |
migrate>Ad-B No edit summary |
||
| Line 1: | Line 1: | ||
This function enables bi-directional authentication. | <span style="font-size:small;">This function enables bi-directional authentication. <span style="color: rgb(0, 0, 0); line-height: 16px;">The combination of initiator and target authentication is called mutual authentication and provides additional security. </span><span style="color: rgb(0, 0, 0); font-family: Verdana; line-height: 16px;">With target authentication, when the initiator tries to connect to a target, the target supplies a user name and password to the initiator. The initiator compares the user name and password to mutual authentication credentials that you configure in the initiator configuration interface. The iSCSI connection succeeds only if the information matches.</span></span> | ||
<span style="font-size:small;"><span style="color: rgb(0, 0, 0); font-family: Verdana; line-height: 16px;">A group automatically enables target authentication using a default user name and password, which you can change. Whether the initiator requires target authentication depends on the initiator configuration settings.</span></span> | |||
Revision as of 12:03, 16 June 2014
This function enables bi-directional authentication. The combination of initiator and target authentication is called mutual authentication and provides additional security. With target authentication, when the initiator tries to connect to a target, the target supplies a user name and password to the initiator. The initiator compares the user name and password to mutual authentication credentials that you configure in the initiator configuration interface. The iSCSI connection succeeds only if the information matches.
A group automatically enables target authentication using a default user name and password, which you can change. Whether the initiator requires target authentication depends on the initiator configuration settings.