Chapter 2. Authentication: Proof of Identity

The most important thing that you can do to manage information access is to require that those who want to access information provide proof of identity. If you require all potential users of your information system resources to authenticate themselves, that is, to prove they are who they say they are, then you can restrict system and resource access to approved identities. Authentication can be a precursor to authorization and accountability. Authorization determines the type of access the authenticated users are allowed and the rights they have on the system. Accountability is the ability to determine who did what. It is based on your ability to record the systems and resources that users have accessed ...

Get Windows Server 2003 Security: A Technical Reference now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.