Next: , Previous: , Up: The TLS Handshake Protocol   [Contents][Index]


3.5.2 Authentication

The key exchange algorithms of the TLS protocol offer authentication, which is a prerequisite for a secure connection. The available authentication methods in GnuTLS, under TLS 1.3 or earlier versions, follow.

Under TLS 1.2 or earlier versions, the following authentication methods are also available.