7 Security Considerations

MISSING

Suggested content for this section :

Define share security level. What dialects support it?

  1. Define user security level.

  2. How is it supported in PDC/BDC environment (NT4)

  3. How it supported in Active directory environment. Define the different security considerations in different Active Directory modes.

  4. How Kerberos security is used?

  5. What are the protocols (or DCE/RPC) needed for each of the User level security models

  6. Some discussion on how file access is authenticated, or how the SID is retrieved in each of the user level environments mentioned above for ACL

  7. Include the security protocol, or reference to it



Implementing CIFS. The Common Internet File System
Implementing CIFS: The Common Internet File System
ISBN: 013047116X
EAN: 2147483647
Year: 2002
Pages: 210

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net