General#23c. What combinations of auth methods do work reliably?
There is one case of chaining two auth methods together that does work reliably. The first auth method must be “one-pass” and must use only computer-supplied information (no chance of a user ever mistyping or delaying a password) and must always provide the same answer immediately every time it’s repeated (the second auth method is not so restricted, for example it may be “two-pass”) and must be configurable in Squid too.
Related Questions
- Could you provide examples of "significant" and "minor" deficiencies and suggest appropriate methods for reporting them in the Institutional Semiannual and Annual Reports?
- Can the response of port-wine stains to laser treatment be reliably assessed using subjective methods?
- What are the different methods available to improve gear precision?