Appendix D -- Internet Information Services Authentication Summary

[Previous] [Next]

Appendix D

Internet Information Services Authentication Summary

This appendix summarizes the capabilities of all the authentication mechanisms available to you in Internet Information Services (IIS) 5. It's assumed you're familiar with IIS authentication schemes and have read about them in Chapter 5, "Internet Information Services Security Overview." For each authentication protocol, we'll look at the following:

  • Is the protocol available in IIS 4?
  • What privileges are required for the accounts using the protocol?
  • Does the protocol support delegation?
  • A diagram of the protocol delegation capabilities.
  • Does the protocol require Active Directory?
  • Which browsers support the protocol?
  • Does the protocol work through proxies and firewalls?


Designing Secure Web-Based Applications for Microsoft Windows 2000 with CDROM
Designing Secure Web-Based Applications for Microsoft Windows 2000 with CDROM
ISBN: N/A
EAN: N/A
Year: 1999
Pages: 138

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net