Next: , Previous: , Up: The TLS Handshake Protocol   [Contents][Index]


3.5.2 Authentication

The key exchange algorithms of the TLS protocol offer authentication, which is a prerequisite for a secure connection. The available authentication methods in GnuTLS follow.