Skip to main content

Authentication

The following diagram illustrates how the SHA1 Hash authentication is performed:

SHA Hash