Chapter 11. Understanding Network Access Security and Kerberos

I USED TO BE MIS DIRECTOR FOR A company that ran telesales call centers. Every once in a while, a sales agent would get a prospect on the line with a network security background. How would I know? The prospect would ask questions like, “How do I know beyond a shadow of a doubt that you are who you say you are?” and “How do I know beyond a shadow of a doubt that you're permitted to sell this to me?” and “Do you mind if I record this call?”

These questions indicate that the prospect was familiar with the three pillars of network security:

  • Authentication

  • Authorization

  • Accountability (Auditing)

In case you're wondering, the sales agents would generally react to these types of questions ...

Get Inside Windows® Server 2003 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.