Name Constraints, 505–7
defined, 505
example, 507
types, 506
See also Certificate constraint extensions
Name suffix routing, 83–88
Naming Service Switch (NSS), 270–71
architecture, 271
as client-side technology, 270
defined, 270
support, 271
NETBIOS, 70–71
Netdiag, 97, 200
Netdom.exe, 96
Netlogon logging, 130–32
defined, 130
enabling, 131
running, 131
single/multiple file query, 132
.NET Framework
concepts, 401–2
Configuration tool, 407
machine stores, 408
Netscape revocation extensions, 598–99
Net time, 196
Networked trust model, 499–501
bridge, 501
cross-certification, 499
illustrated, 499
meshed, 500–501
See also PKI trust models
Network Information Service (NIS), 268–69
architecture, 269
coexistence solutions, 275–86
deficiencies, 269
defined, 268
domains, 268
futures, 271–72
repositories, 268
SFU server for, 276–78
See also NIS+
Networking service management delegation, 388–89
Network logon process
multiple domain environment, 158–59
single domain environment, 153–54
See also Kerberos
Network monitor, 200
Newsid, 44
NIS+, 269–70
architecture, 270
concepts, 269
defined, 269
See also Network Information Service (NIS)
NIS/LDAP gateway, 286–87
architecture, 287
functionality, 286
Nlparse.exe, 131
Nltest.exe, 94, 97
Noninteractive authentication
architecture, 108–11
architecture illustration, 109
SSPI, 108, 109, 110, 111
SSPs, 108, 109, 110
See also Authentication
Novell Modular Authentication Service (NMAS), 105
NShield, 483–86
defined, 483
device with internal SCSI connector, 484
FIPS default, 486
key protection, 483
k-of-n mechanism, 485
security world/components, 484
Nss_ldap, 287–88
configuration options, 288
defined, 288
NTAUTH Active Directory store, 520
NTBackup APIs, 652
NTFS file streams, 647
NTLM
authentication, 116–20
authentication flow, 116
defined, 116–20
Kerberos vs., 136, 137
LM compatibility settings, 118
LM hashes, 119–20
LM protocol, 117
NT hashes, 120
NT protocol, 117
protocol, 116–18
subprotocols, controlling, 118–19
Ntpasswd, 666