13 NETWORK AUTHENTICATION

The previous chapter discussed interactive authentication, which allows a user to log in to a computer and interact with a desktop. By contrast, network authentication occurs when the user has already authenticated to a Windows system but wants to use resources on another Windows system, typically over a network.

The simplest approach to performing network authentication might seem to be to transfer the user’s credentials to the remote system. The service that receives the credentials could then call the LsaLogonUser API and specify the Network logon type to create a noninteractive logon session. However, this approach ...

Get Windows Security Internals now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.