AAA - THE HOLY GRAIL OF MODERN NETWORK ACCESS

ZENCC > Blog > AAA - THE HOLY GRAIL OF MODERN NETWORK ACCESS
AAA - THE HOLY GRAIL OF MODERN NETWORK ACCESS

AAA - The Holy Grail Of Modern Network Access

AAA (Authentication, Authorizing and Accounting), quite simply is the method/process used to control access to a wi-fi service and wireless network. It is a standard framework used to regulate users, access or even devices.

Let us try to understand all the 3 As of AAA.

 

Authentication

This is the first logical clog in the process. This identifies the user who wants to access your network and decides their rights on the network.

The user is identified by a validity check. This validity check can be done through credentials such as user name/password or certificate that can be changed from time to time or be generated at every instance separately. A competent network manager handling a wireless or a VPN network can control how a user is authenticated and how much of rights user possesses in terms of access to network places or even the number devices he can bring to the network.

A deep level of customization is available for this stage to ensure Wi-Fi network security in private and public hotspots.

 

Authorization

This stage provides capabilities to enforce policies on network access after the user has gained access to the network through authentication. After the authentication is successful, authorization can be used to determine what time frame or data is the user allowed to access and the operations that can be performed.

 

Accounting

Accounting provides means of monitoring and capturing the events done by a user while accessing the network.

It even monitors various things like - how long the user has access to the network. The administrator can create an accounting method list to specify what should be accounted and to whom the accounting records should be sent or archived.

This is essentially a process by which it can be identified that the user, which want to access the authentication, default or customized authentication method list is used.

 

These 3 are a precursor for any modern business concerned with its network security. Business firms ranging from neighbourhood restaurants and cafes, BnB joints, small and big hotels, educational institutes, temporary events, large public places to large corporate and government institution all either use or need to use these protocols to ensure network sanctity and security in these times.

At Zen CC we have competent cloud-based solutions to ensure your network safety.

  Data Security

For securing your networks, get in touch with ZENCC. Write to marketing@zencc.net for further details.