Chapter 3. Authorization—Limiting System Access and Controlling User Behavior

Imagine you've come to my house for a visit. We've met and talked before, worked on a project together, or perhaps we know each other from church or because our boys attend the same high school. At the door, I greet you and invite you inside. What is it that keeps you from immediately going wherever you want? What prevents you from grabbing a beer from my refrigerator, knocking over the china cabinet, and kicking my dog?

Surely you're grinning now; you've recognized my ploy—you've equated my recognition of you as authentication and the use of biometrics (I recognize you by your appearance). And you've recognized my inviting you inside as authorization to enter the house, ...

Get Windows Server 2003 Security: A Technical Reference now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.