Directory Authentication Protocols

Directory authentication protocols allow systems to centrally manage and verify user credentials, typically in enterprise environments where secure and scalable identity management is essential.

Protocol

Description

Use Case

LDAP (Lightweight Directory Access Protocol)

A lightweight protocol used to access and maintain distributed directory services over IP networks. LDAP is widely used in enterprise environments for centralized authentication and directory lookups. Commonly used with Active Directory and OpenLDAP.

Enterprise SSO, directory lookups, centralized authentication

Kerberos

A secure ticket-based authentication protocol that uses symmetric key cryptography to validate users and services. Developed at MIT, it’s used to provide strong authentication across insecure networks. Used heavily in Microsoft Active Directory.

Secure login, enterprise SSO, identity validation

RADIUS (Remote Authentication Dial-In User Service)

A client-server protocol used for AAA (Authentication, Authorization, Accounting). Often used by ISPs and network devices to authenticate users connecting to the network. Supports centralized login for VPNs, WiFi, etc.

Network access control, VPN authentication

TACACS+ (Terminal Access Controller Access-Control System Plus)

A Cisco-developed protocol used for centralized AAA functions in networking environments. Unlike RADIUS, it separates authentication, authorization, and accounting. Secure communication over TCP, commonly used in Cisco environments.

Device administration, granular command authorization

RFC: RFC 4511

Main Features:

  • Lightweight protocol for accessing and maintaining directory information

  • Runs over TCP/IP (commonly on port 389)

  • Optimized for read-heavy operations

  • Hierarchical structure using DN (Distinguished Names)

  • Widely supported in enterprise applications and systems

  • Supports user and group queries, authentication info, email directories, etc.

Use Cases:

  • Centralized authentication in enterprise environments

  • Directory lookups for users, groups, devices, or services

  • Integration with Active Directory or OpenLDAP

  • Enterprise Single Sign-On (SSO) and role-based access control

Alternative Protocols:

  • Kerberos – For secure authentication and SSO

  • RADIUS – For AAA with network access devices

  • TACACS+ – For device-level admin access and AAA

  • SCIM – System for Cross-domain Identity Management (modern identity APIs)

RFC: RFC 4120

Main Features:

  • Secure authentication protocol using ticket-based system

  • Relies on symmetric key cryptography

  • Operates over an insecure network without transmitting passwords

  • Authenticates both users and services (mutual authentication)

  • Used extensively in Active Directory environments

Use Cases:

  • Secure login across enterprise systems

  • Enterprise Single Sign-On (SSO)

  • Secure service-to-service authentication

  • Microsoft Active Directory authentication backbone

Alternative Protocols:

  • LDAP – For directory queries and account information

  • RADIUS – For user authentication and authorization over networks

  • NTLM – Legacy authentication protocol (less secure than Kerberos)

  • SAML / OAuth – For web-based federated identity management

RFC: RFC 2865 (Authentication and Authorization), RFC 2866 (Accounting)

Main Features:

  • AAA protocol (Authentication, Authorization, Accounting)

  • Operates over UDP (default ports: 1812 for auth, 1813 for accounting)

  • Centralizes user authentication for network access

  • Supports dynamic IP assignment, session tracking, and policy enforcement

  • Commonly used in ISPs, Wi-Fi networks, and VPNs

Use Cases:

  • VPN user authentication

  • Wi-Fi login with central credential validation

  • ISP subscriber management

  • Network access control for switches and firewalls

Alternative Protocols:

  • TACACS+ – More control over authorization; used in enterprise environments

  • Kerberos – For secure ticket-based authentication

  • LDAP – For directory-based user lookup and authentication

  • Diameter – A modern, more extensible replacement for RADIUS

RFC: Informational – Cisco proprietary (documented in IETF drafts)

Main Features:

  • AAA protocol focused on device administration

  • Encrypts the entire packet (unlike RADIUS, which only encrypts the password)

  • Offers granular command-level authorization

  • Uses TCP (typically port 49)

  • Separates Authentication, Authorization, and Accounting into distinct functions

Use Cases:

  • Centralized login for administrators on network devices

  • Command-level access control for routers, switches, firewalls

  • Secure auditing of administrative access

  • Enterprise access management for infrastructure

Alternative Protocols:

  • RADIUS – For centralized AAA on end-user access systems

  • LDAP – For authentication integrated with user directories

  • Kerberos – For secure authentication across applications

  • Local device credentials – In environments without centralized control