PC Authentication Security (Windows CE 5.0)
The PC Authentication Catalog item is designed to use a network. To mitigate potential security risks, use available network security resources.
For information about how the connection between a desktop computer and a Windows CE-based device is authenticated and encrypted, see PC Authentication Architecture.
Note Desktop computers that use IPsec can cause the communication between the desktop computer application and the LAP to operate differently. For more information, see PC Authentication and IPsec.
Best Practices
When using the PC Authentication Catalog item, remember the following best practices:
Consider LASS Security Content
PC Authentication uses the Local Security Subsystem (LASS). For more information about LASS security concerns, see LASS Security.
Keep existing security measures if you modify code
The provided PC Authentication implementation helps to secure communication between the Windows CE-based device and the desktop computer by using mutual authentication and Kerberos encryption. If you modify the provided source code, ensure that your modifications do not compromise the security provided by the existing code.
Default Registry Settings
You should be aware of the registry settings that impact security. If a value has security implications, you will find a Security Note in the registry settings documentation.
For registry information, see PC Authentication Registry Settings.
See Also
PC Authentication | Enhancing the Security of a Device
Send Feedback on this topic to the authors