PKI (Public Key Infrastructure)
Public key infrastructure. Includes digital certificates and certificate authorities (CAs) using public key cryptography.
Certificate authority (CA)
An organization that guarantees reliability. It is divided into a root Certificate Authority and an intermediate Certificate Authority.
It has a tree structure with the root Certificate Authority at the top and an intermediate Certificate Authority under it.
Intermediate certificate authority
Among Certificate Authorities (CAs), indicates a Certificate Authority whose reliability is guaranteed by a higher-level Certificate Authority (CA).
Root certificate authority
Among Certificate Authorities (CA), indicates a Certificate Authority whose reliability is guaranteed by itself.
Root certificate authority certificate
A public key certificate that has the same issuer and subject and has signed its own public key with its own private key. It is the root of a tree-structured certificate.
Data that certifies that the public key issued by the Certificate Authority is the genuine issuer’s public key.
When the issuer makes a certificate request to the Certificate Authority (CA) together with the public key, the Certificate Authority (CA) issues a digital certificate after scrutinizing and confirming it.
EAP-MD5 authentication method (Message digest algorithm 5)
This is an authentication method that uses a user name and password. Authenticates by exchanging an MD5 hash value instead of a plain text password.
EAP-TLS authentication method (Transport Layer Security)
An authentication method used in IEEE 802.1X, a type of EAP implementation that authenticates by exchanging digital certificates after encrypting the transport layer between the user and the RADIUS server, instead of authenticating with a user ID and password. This is defined in RFC2716 and RFC5216.
EAP-TTLS authentication method (Tunneled TLS)
An authentication method used in IEEE 802.1X, a type of EAP implementation that establishes a TLS communication channel using the server’s digital certificate and authenticates the user with a password within the encrypted channel. This is defined in RFC5281.
PEAP authentication method (Protected EAP)
The operating principle is the same as EAP-TTLS (there is only a difference in the protocol in the encrypted tunnel). A TLS communication channel is established using the server’s digital certificate, and the user is authenticated with a password in the encrypted communication channel.
A certificate indicating that the public key belongs to the issuer has been issued by a trusted third party.
The host device that provides the RADIUS server function, in this case, this device.
Authenticates connected users via a RADIUS server and manages authentication/authorization information such as user IDs, passwords, MAC addresses, and associated VLANs.
A certificate to state that the Certificate Authority (CA) has proved that the RADIUS server is trusted.
Also called a NAS or an authenticator, it relays between the user connected to the LAN/SFP port and the authentication server, and controls access to the LAN based on the success or failure of authentication.
A device that connects to a RADIUS client and requests authentication, or a supplicant that is software.
It is the minimum unit for identifying the person to be authenticated. There are data required for authentication and authorization, such as a unique user ID and password.
Client certificate (user certificate)
This certificate proves that the user described above is trusted by the Certificate Authority (CA).