Security
On Where to Authenticate
You've been given a requirement to restrict access to a certain set of documents. Where do you authenticate readers in order to authorize access?
- the operating system
- the transfer protocol
- an application riding the transfer protocol
2:14:12 PM # Google It!
categories: Security