Security Solutions
3-78
Designing Access Controls
Choose RADIUS Servers
Choose RADIUS Servers
As you will recall from Chapter 1: “Access Control Concepts,” the
authentication architecture consists of four primary components:
■ Endpoint
■ Policy enforcement point (PEP)
■ Policy decision point (PDP)
■ Policy and credential repository
Figure 3-8. Network Authentication Architecture
In this step, you will select and decide how to deploy your PDPs and policy
repositories.