IIS 6.0
architecture, 208
authentication, 207–40
authentication method comparison, 240
authentication options, configuring, 210
configuration backup and restore utility, 635
Resource Kit WebFetch, 213, 214
SecurID-based, 210, 211
security changes, 208
IIS Manager MMC snap-in, 207
Iissuba.dll, 220
Impersonation levels, 334
INetOrgPerson security principal, 39
Inheritance
ACL, 337
in ACL Editor advanced view, 339, 340
blocking, 341–42
controlling, 341–45
controlling, with blocking, 341
dynamic, 338–39
fine-grained control, 337–45
NT4 and Windows 2000 comparison, 338–41
object type-based ACEs and, 354
setting, in ACL editor, 342
static, 338
trust constraint, 540–41
Insourced PKI solutions, 606–7
Integrated Windows authentication, 221–23
authentication protocols, 221
defined, 221
dialog box, 223
password transmission, 222
See also Authentication
Interactive authentication
architecture, 107–8
architecture illustration, 108
sequence, 107
See also Authentication
Internet Authentication Service (IAS), 324–26
authentication methods, 326
defined, 324
SSO, 325
Internet Information Services. See IIS
Internet Trust and Security, 6
Interoperability, 200–206
cross-realm trust, 203–6
non-Windows implementations, 200
PKI, 443
principals defined on non-Windows KDC, 203
principals defined on Windows KDC, 202–3
scenarios, 201–6
Windows implementations, 200–201
See also Kerberos
Interoperability enabling technologies, 262–64
Kerberos, 263–64
LDAP, 263
Intrusion detection systems (IDSs), 3, 720
Issuance policies, 507–8
defined, 507
in end-entity certificates, 507
example, 509
predefined, 508