次の方法で共有


2.2.1.1.7 Security Providers

The RPC protocol extensions do not require support for the dce_c_rpc_authn_protocol_krb5 security provider, as specified in [C706] section 13. All of the requirements specified in [C706] section 13 are removed by these extensions.<22>

These extensions specify the following values for the security provider.

Name

Value

Security provider

RPC_C_AUTHN_NONE

0x00

No Authentication

RPC_C_AUTHN_GSS_NEGOTIATE

0x09

 SPNEGO

RPC_C_AUTHN_WINNT

0x0A

NTLM

RPC_C_AUTHN_GSS_SCHANNEL

0x0E

TLS

RPC_C_AUTHN_GSS_KERBEROS

0x10

Kerberos

RPC_C_AUTHN_NETLOGON

0x44

Netlogon

RPC_C_AUTHN_DEFAULT

0xFF

Same as RPC_C_AUTHN_WINNT

On the client side, if the higher level protocol requests RPC_C_AUTHN_DEFAULT, the implementation MUST use RPC_C_AUTHN_WINNT instead.

The security provider underlying protocol and implementation defines the number of legs and whether the number of legs is odd or even that are used in the token exchange process that builds a security context. This information MAY be used for the processing of PDUs during that process. 

These extensions specify the following number (if known) or even/oddness of the legs needed to build a security context.

Name

# of or Even # of Token Exchange Legs

RPC_C_AUTHN_NONE

even

RPC_C_AUTHN_GSS_NEGOTIATE

even

RPC_C_AUTHN_WINNT

3

RPC_C_AUTHN_GSS_SCHANNEL

even

RPC_C_AUTHN_GSS_KERBEROS

even

RPC_C_AUTHN_NETLOGON

3

RPC_C_AUTHN_DEFAULT

unknown