October 2019
Intermediate to advanced
374 pages
13h 10m
English
When you log on to your computer, Windows follows a specific process to validate you as an authorized user and to decide what you are allowed to do. At the end of the process, Windows has all the information it needs to allow or deny actions based on your security settings. Here are the steps Windows takes to validate a user and build the necessary security information:
Windows prompts the user to enter identification and authentication credentials. This can be a prompt for username and password, token entry such as a smart card or a token generated password, or a biometric device, such as a fingerprint reader.
Windows looks up the defined user and the associated ...
Read now
Unlock full access