4 OPC UA security architecture ToC Previous Next

4.2 Security objectives ToC Previous Next

4.2.2 Authentication ToC Previous Next

Entities such as clients, Servers, and users should prove their identities. Authentication can be based on something the entity is, has, or knows.

Previous Next