Jump to content

Talk:Authentication, authorization, and accounting

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia
(Redirected from Talk:Diameter protocol)

Suggest rename of Article

[edit]

AAA Protocols are a *family* of protocols, including Diameter, RADIUS, etc. Having the "AAA" page lead off with "The Diameter protocol.." is wrong.

Diameter should gave it's own page. RADIUS should have it's own page. AAA should have it's own page which explains the general idea of AAA protocols, and which points to both the RADIUS and Diameter pages.

I say this as someone who's worked with RADIUS for over 20 years, and Diameter from before it existed as a standard protocol. I've tried making these changes in the past, and they've always been reverted. So far as I can tell, by people who don't use RADIUS or Diameter, and who know nothing about them.

Alandekok —Preceding undated comment added 12:49, 15 September 2017 (UTC)[reply]

Protocol?

[edit]

Is AAA itself a protocol? Isn't it more the methodology used to authenticate, etc., using protocols such as RADIUS or TACACS+? --Diogenes00 23:40, 2 June 2006 (UTC)[reply]

Agreed

[edit]

Neither a protocol nor a classification of protocols. Plain speech, please. AAA is a model used to describe three commonly associated aspects of the concept "Access Control".

Princeton WordNet definition: http://wordnetweb.princeton.edu/perl/webwn?s=protocol

Jeffp231 (talk) 20:21, 2 September 2010 (UTC)[reply]

Agreed Bezanson (talk) 22:47, 8 March 2016 (UTC)[reply]

Suggest rename of Article

[edit]

It's a classification of protocols rather than a particular one. Maybe renaming the page to "AAA protocols" or "Authentication, Authorization and Accounting" makes better sense.

Suggest "AAA (information technology)"

[edit]

Protocols implies the same thing as Protocol, IMHO. I like the heading of AAA with the (information technology) byline. That should help distinguish it from abdominal aortic aneurysm, the American Automobile Association, and Triple-A baseball.

Jeffp231 (talk) 20:39, 2 September 2010 (UTC)[reply]

Alternately, my suggestion is "AAA Model" or "AAA Model (Information Technology)." In computing, protocols are things like TCP/IP, HTTP, SSH, etc. dafydd (talk) 14:32, 9 April 2013 (UTC)[reply]

Suggest "AAA - Authentication, Authorization and Accounting (Computer Security)"

[edit]

Since this is a topic that pertains to Computer Security/Information Security/Cybersecurity more than "Information Technology". This page contains general AAA related information, of which "Diameter" is a solution and this page is also linked/redirected by AAA_Protocol and AAAA_Protocol. The page mentioned for merging, https://wiki.riteme.site/wiki/Diameter_(protocol), is about the Diameter protocol from a technical level and that page should stay that way. Bezanson (talk) 22:46, 8 March 2016 (UTC)[reply]

Authorisation is not the same as Access Control

[edit]

I dispute that "Authorisation" should be called Access Control. Authorisation is the granting of authority to perform some action, which may or may not involve access to a resource. Access control is a narrower concept, the implementation of an particular kind of authorisation policy. Access control is the mechanism that permits or denies access to resources according to the authorities granted to an authenticated identity.

In computing and communications this may be effectively coincident with authorisation, when most authorisations are about allowing access to something. But the principles of AAA can be applied in wider contexts, so it is a distinction worth maintaining. Swiveler (talk) 01:49, 5 February 2010 (UTC)[reply]

Agreed

[edit]

Authorization is 'Permission' or 'Rights'. Authorization IS NOT Access Control.

Access control is a methodology that can include Authorization/Authorisation if needed, (depends on which side of the pond you're on) depending on the requirements given for the Access Control solution.

If you don't care WHAT people do, so long as you know WHO THEY ARE and WHEN THEY LOGON, you only need Authorization and Auditing.
If you absolutely must know WHAT was done and WHEN, but you don't care WHO did the deed, you drop Authentication and add Authorization, retaining Auditing.

Jeffp231 (talk) 20:28, 2 September 2010 (UTC)[reply]

Usage of AAA servers in LDAP networks - Section name incorrect?

[edit]

LDAP is in the heading but never again refer to. Should it not be CDMA networks? Also, LDAP is a protocol, not a network by itself.