Endpoint authentication (device authentication)
Endpoint authentication is a security mechanism designed to confirm that solely approved devices will hook up with a given network, site or service.
The approach is also referred to as device authentication. In this context, the endpoint most usually thought of could be a mobile information processing system, like a laptop, smart phone or pill however it might be any connected hardware device on a TCP/IP network. The possibilities embody desktop computers, printers, servers and specialized hardware such as POS terminals, good meters and alternative smart devices.
Endpoint security management is changing into progressively necessary in the increasing areas of machine-to-machine (M2M) communications and therefore the net of Things (IoT). Endpoint procedure is one methodology of facultative authentication of non-traditional network endpoints such as smartcard readers, HVAC systems, medical equipment and IP-enabled door locks.
In human communications, endpoint authentication is usually utilized in conjunction with user authentication for larger security. Authenticating both the user and the device will give two-factor authentication (2FA). For a smartphone, there are apps that give one time watchword tokens, allowing the phone itself to serve as the physical device to satisfy the possession issue. The password response sent from the registered device verifies that the user is connecting from AN approved termination.