Summary

In this chapter you got a look at how you can take a username and password and log that user into a domain so that you can use impersonation of that user to restrict access to resources on the server and network. This can be a powerful means of implementing integrated security into a networked application, leveraging the security profiles that the network administrator is already configuring and maintaining.

In the next chapter, you'll begin to learn how to access and interact with Active Directory servers using the Active Directory Security Interface (ADSI). This will include connecting to the Active Directory server using the Kerberos authentication protocol, as well as accessing NT 4 domains and computers. If you want to learn how ...

Get Developing Secure Applications with Visual Basic now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.