2.1.2 Network Logon Authentication

The network logon authentication section with its subsections describe the process and the methods by which authentication protocols work in conjunction to prove the user's identity. Network logon authentication is used only after interactive logon authentication has taken place. Network logon does not rely on user interface components, such as a dialog box, to collect data. Instead, previously established credentials or another method to collect credentials is used. This process confirms the user's identity to any network service that the user attempts to access. This process is typically invisible to the user, unless the user is required to provide alternate credentials.