Chapter 15: Logon and Authentication


Highlights

When a user logs on to a computer, a series of steps begins that makes up the authentication process. Authentication validates user identity and defines resources that a user can access. Windows operating systems use NTLM or the Kerberos V5 authentication protocol. Authentication is mostly automatic, but understanding the protocols, policies, and other elements involved can help you configure and manage authentication and strengthen security.

Related Information

  • For more information about authorization, see Authorization and Access Control in this book.

  • For more information about authentication by using remote access services, see Connecting Remote Offices in this book.

  • For more information about Kerberos V5 authentication, see Authentication in the Distributed Systems Guide of the Microsoft Windows 2000 Server Resource Kit.

  • For more information about implementing security for Windows-based client computers and servers, see the Microsoft Windows Security Resource Kit.




Microsoft Windows XP Professional Resource Kit 2003
Microsoft Windows XP Professional Resource Kit 2003
ISBN: N/A
EAN: N/A
Year: 2005
Pages: 338

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net