Today, network connection requests by clients typically are granted or denied based on a client’s ability to prove some or all of his credentials, including passwords, machine certificates and user ...