A '''passwordPassword authenticationAuthentication protocolProtocol''' ('''PAP''') is ana [[password|password-based]] [[authentication protocol]] thatused usesby a[[Point to Point Protocol]] to validate users. Almost all [[passwordnetwork operating system]] remote servers support PAP.
PAP is considered a weak authentication scheme (weak schemes are simple and have lighter [[overhead (computing)|computational overhead]] but are much more vulnerable to attack; while weak schemes may
PAP is used by [[Point to Point Protocol]] to validate users before allowing them access to server resources. Almost all [[network operating system]] remote servers support PAP.
have limited application in some constrained environments, they are avoided in general). Among PAP's deficiencies is the fact that it transmits unencrypted [[ASCII]] passwords over the network. and PAP is therefore consideredused insecure. It is usedonly as a last resort when the remote server does not support a stronger authenticationscheme protocol,such likeas [[Challenge-handshake authentication protocol|CHAP]] or [[Extensible Authentication Protocol|EAP]] (the latter is actually a [[Software framework|framework]]).▼
▲PAP transmits unencrypted [[ASCII]] passwords over the network and is therefore considered insecure. It is used as a last resort when the remote server does not support a stronger authentication protocol, like [[Challenge-handshake authentication protocol|CHAP]] or [[Extensible Authentication Protocol|EAP]] (the latter is actually a [[Software framework|framework]]).
'''Password-based authentication''' is the protocol where two entities share a password in advance and use the password as the basis of authentication. Existing password authentication schemes can be categorized into two types: weak-password authentication schemes and strong-password authentication schemes. When compared to strong-password schemes, weak-password schemes tend to have lighter [[overhead (computing)|computational overhead]], the designs are simpler, and implementation is easier, making them especially suitable for some constrained environments.