Windows Authentication Technical Overview
Applies To: Windows Vista, Windows Server 2008, Windows 7, Windows 8.1, Windows Server 2008 R2, Windows Server 2012 R2, Windows Server 2012, Windows 8
This topic for the IT professional provides links to topics for the Windows Authentication Technical Overview. Windows authentication is the process to prove the authenticity of a user or service attempting to access Windows.
This collection of topics describes Windows authentication architecture and its components.
To digitally save or print pages from this library, click Export (in the upper-right corner of the page), and then follow the instructions.
Differences in Windows Authentication Between Windows Operating Systems
Describes the significant differences in the authentication architecture and processes.
Windows Authentication Concepts
Describes the concepts on which Windows authentication is based.
Windows Logon Authentication Scenarios
Summarizes the various logon scenarios.
Windows Authentication Architecture
Describes the significant differences in the authentication architecture and processes for Windows operating systems.
Security Support Provider Interface Architecture
Describes the SSPI architecture.
Credentials Processes in Windows Authentication
Describes the different credential management processes.
Group Policies used in Windows Authentication
Describes the use and impact of Group Policies in the authentication process.
What is not covered
This collection of topics does not cover procedures for designing, implementing, or monitoring your authentication technologies within a Windows environment.
For design information on Windows authorization strategies, see Designing a Resource Authorization Strategy.
For design information on Windows authentication strategies, see Designing an Authentication Strategy.
For design information on Windows public key infrastructure implementation strategies, see Designing a Public Key Infrastructure.
For configuring and monitoring security, including authentication, in your Windows environment, see:
For information about auditing logon and authentication events in Windows, see Auditing Security Events.