Validating a Domain Login
The NTLM and Kerberos protocols solve the same problem in different scenarios. The NTLM protocol uses the standard username and password for authentication over a local area network (LAN). The Kerberos protocol is part of the Security Support Provider Interface (SSPI), which is used for performing authentication and authorization over a distributed network using certificates.
The basic function that NTLM authentication performs is validating a username and password and providing a logon session handle. This handle can then be used to impersonate the user that is logging in, and thus allow the operating system to perform its access control functions.
Modifying Access Permissions
Before you are able to validate a user ...
Get Developing Secure Applications with Visual Basic now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.