Retrieved from https://studentshare.org/information-technology/1678101-aaa-servers
https://studentshare.org/information-technology/1678101-aaa-servers.
One of the benefits of the servers is to enhance security (Lin, Cheng, & Liao, 2009).
Authentication is suitable for user identification, typically by having the user enter a valid password and username before access is. The authentication process enables each user to have unique criteria for gaining access to the computer. The AAA compares other user credentials within the database to the authentication credentials. The user is only granted access when the credentials match one another. Authentication fails when the credentials are at variance, and the access is (Choi, Jung, & Jang, 2007).
After authentication, a user has to be authorized (authorization) to perform a certain task. The user may try to issue the command after logging into the system. Authorization is the process of determining the qualities or the types of resources, activities, and services that a user is permitted to undertake. Accounting measures the resources that a user utilizes during access. It comprises the amount of data and time that a user has spent or used (Lopez-Fernandez et al., 2014). But if using the server the company can control access to information and data while at the same time keeping a record of the time and resources spent by the user.
The motive authentication, authorization, and accounting server addresses roaming partnerships, complex resource sharing, and integration of disparate technologies such as Wi-Fi, LTE, DSL, GPON, and small cell. The server delivers extended functionality for the deployment of blended multimedia services, wireless LANs, and other networks supporting fixed mobile roaming. The server is beneficial to the organization since it supports unlimited numbers of subscribers having many configurations (Zaghloul & Jukan, 2009).
Read More