Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
15 Cards in this Set
- Front
- Back
Configuring Authentication and Authorization
What is Authentication ? |
Authentication is an automated process whereby a computer verifies the identity of a user, computer, or service attempting to access the system.
|
|
Authentication Forms ?
|
Password
Certificate Smart card Biometrics Security protocol. |
|
What is the Windows PIV standard ?
|
Personal Identity Verification, commonly referred to as the PIV standard, allows users to use smart cards from any vendor that has published their smart card drivers with Windows Update.
|
|
How does the PKINIT protocol help with Smart Cards ?
|
If you use the PKINIT protocol, Windows 7 automatically finds the driver for a smart card. So the smart card can authenticate the domain without requiring the user to add intermediary software.
|
|
Some Authentication protocol packages ?
|
Negotiate
TLS/SSL Credential SSPs, and Digest |
|
What is the Kerberos Authentication protocol.
|
Windows 7 uses Kerberos Version 5.0 as an SSP accessible through an SSPI. Kerberos 5.0 authenticates between a client and a server, or between individual servers.
|
|
What is the NTLM Authentication protocol ?
|
NTLM is a challenge/response authentication protocol used to verify the identity of parties falling outside of a particular domain. For example, it can be used to authenticate unaffiliated work groups or servers.
|
|
What is the Credential SSP Authentication protocol.
|
Features single sign-on with Terminal Services. With CredSSP, users' credentials can be transferred from a client computer to the target server using client policies.
|
|
What is the Digest Authentication protocol.
|
Digest is a challenge/response protocol that requires authentication conducted using secret keys.
|
|
Tip: To enable or disable biometric technology , you use the appropriate Group Policy settings.
|
Tip: To enable or disable biometric technology , you use the appropriate Group Policy settings.
|
|
Abbrev : UAC - User Account Control
|
Abbrev : UAC - User Account Control
|
|
Tip : To Launch Local Security Policy please " RUN secpol.msc"
|
Tip : To Launch Local Security Policy please " RUN secpol.msc"
|
|
Tip : Credential Manager manages user names, passwords, and proof of identification.
|
Tip : Credential Manager manages user names, passwords, and proof of identification.
|
|
Location of "User Rights Assignment" in Local Security Policy ?
|
Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment
|
|
Tip: The netsh lan command can garner information about specific hardware and configuration settings of your client. By contrast, wireless authentication uses the netsh wlan command.
|
Tip: The netsh lan command can garner information about specific hardware and configuration settings of your client. By contrast, wireless authentication uses the netsh wlan command.
|