Table 1: SIP servers can select the SIP methods they choose to authenticate. This table reveals the methods most likely to be authenticated and the typical authentication frequency.

Back to Article