10 WINDOWS AUTHENTICATION

Before you can interact with a Windows system, you need to complete its complex authentication process, which converts a set of credentials, such as a username and a password, into a Token object that represents the user’s identity.

Authentication is too big a topic to cover in a single chapter; therefore, I’ve split it into three parts. This chapter and the next one will provide an overview of Windows authentication, how the operating system stores a user’s configuration, and how to inspect that configuration. In the chapters that follow, we’ll discuss interactive authentication, the mechanism used to interact directly ...

Get Windows Security Internals now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.