What is IAS?

, , Leave a comment

What is IAS?
IAS or Internet Authentication Service is Microsoft’s way or system of centralizing internet authentication, accounting, auditing, and authorization on its Windows Server operating systems. Based on the RADIUS (Remote Authentication Dial-in User Service), IAS provides for authentication services from various means of accessing a particular network. Access to a network may be through wireless means, through the use of a switch for user authentication, through VPNs or virtual private networks, or even dial-up connections.

The RADIUS system is a standard protocol in terms of client-server communication and authentication. Both Windows Server 2000 and 2003 editions implement this standard through IAS. With IAS, large networks will be able to handle authentication needs from a variety of means and scenarios. So whether it is the employees who need authentication from various devices that connect to the company’s network or business agents and partners that need to connect to the same network, IAS will be able to handle these tasks effectively and easily.

A typical IAS setup or infrastructure involves five main components. These are the access clients, IAS or RADIUS servers, RADIUS clients or access servers, IAS or RADIUS proxies, and the main user account database. With all these components, the IAS simply works by requiring a user to undergo a specific verification and authentication process in order for the network to allow or disallow access. The IAS infrastructure also allows for the documentation or logging of any access activity to the network, including logs for failed connection attempts. The IAS system also features multiple authentication setups for greater security to a particular network. The authentication setup may be through passwords based on the system called PPP or Password-based Point-to-Point Protocol. But aside from this standard password-based authentication procedure, other arbitrary procedures may be implemented like the use of certificates, smart cards, and or token cards for additional user authentication and network security.

Tea Time Quiz

[forminator_poll id="23176"]
 

Leave a Reply