Authenticating users early in the connection process reduces the amount of information about that can be gained regarding your IIS 6.0 solution through anonymous access. In highly-secure Web sites and applications, you need to require authentication before the user can access any of the information. For other Web sites and applications, you might require authentication only when the user is going to access portions of the Web site or application that contain confidential information.
Figure 3.5 illustrates the process for configuring user authentication.
Figure 3.5. Configuring User Authentication
Based on the types ...