Content deleted Content added
Line 6:
The [[Client (computing)|client]] connects to the NAS. The NAS then connects to another resource asking whether the client's supplied credentials are valid. Based on that answer the NAS then allows or disallows access to the protected resource.
==Examples==
|