Designing an Authentication Strategy
Applies To: Windows Server 2003, Windows Server 2003 R2, Windows Server 2003 with SP1, Windows Server 2003 with SP2
Most organizations need to support seamless access to the network for multiple types of users, such as workers in offices, employees who are traveling, and perhaps even business partners and customers. At the same time, organizations need to protect network resources from potential intruders. A well-designed authentication strategy can help you achieve this complex balance between providing reliable access for users and strong network security for your organization.
In This Chapter
Overview of the Authentication Strategy Design Process
Creating a Foundation for Authentication
Securing the Authentication Process
Extending Your Authentication Framework
Enabling Supplemental Authentication Strategies
Educating Users About the Authentication Process
Additional Resources for Designing an Authentication Strategy
Related Information
For more information about the Kerberos version 5 authentication protocol, see the Windows Security Collection of the Windows Server 2003 Technical Reference (or see the Windows Security Collection on the Web at https://www.microsoft.com/reskit).
For more information about the Active Directory® directory service logical structure, see "Designing the Active Directory Logical Structure" in this book.
For more information about upgrading from the Microsoft® Windows NT® version 4.0 operating system to the Microsoft® Windows® Server 2003 operating system, see "Upgrading Windows NT 4.0 Domains to Windows Server 2003 Active Directory" in this book.