When a user logs on to a computer, a series of steps begins that makes up the authentication process. Authentication validates user identity and defines resources that a user can access. Windows operating systems use NTLM or the Kerberos V5 authentication protocol. Authentication is mostly automatic, but understanding the protocols, policies, and other elements involved can help you configure and manage authentication and strengthen security.
For more information about authorization, see Authorization and Access Control in this book.
For more information about authentication by using remote access services, see Connecting Remote Offices in this book.
For more information about Kerberos V5 authentication, see Authentication in the Distributed Systems Guide of the Microsoft Windows 2000 Server Resource Kit.
For more information about implementing security for Windows-based client computers and servers, see the Microsoft Windows Security Resource Kit.