Summary

In this chapter, you learned about Windows Server 2003’s two authentication protocols, NTLM and Kerberos. You learned how both protocols work and how they interact with Windows’ authorization requirements. You also learned how Windows’ Kerberos protocol interoperates with non-Windows Kerberos implementations and how to configure Kerberos’ behavior on your network.

Get Securing Windows Server 2003 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.