Share via


Supported Authentication Protocols

With mobile devices providing connectivity for data access, secure communication is imperative. Remote access through the device, such as using the Internet, exposes the device to all known forms of attack and interception. To guard against these threats, mobile devices use the following authentication protocols.

Network Authentication (SSPI)

Remote Access

Virtual Private Networks

WAP Security

See Also

Security for Windows Mobile Devices

Last updated on Friday, April 22, 2005

© 2005 Microsoft Corporation. All rights reserved.

Send feedback on this topic to the authors.