O'Reilly logo

Windows Server 2003 Security: A Technical Reference by Roberta Bragg

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Windows Security Architecture and the Authorization Process

The Windows security architecture model is based on multiple inter-related components. You have already been introduced to one aspect of the design: the authentication component. In Figure 3-1, these areas of the architecture are circled and labeled. Authentication is the first hurdle a potential system user must pass. After logging on, the user's ability to do anything depends on the evaluation done by the Security Reference Monitor (SRM). The SRM resolves each request the user makes for access by comparing the request to his rights on the system and/or the permissions that he has been granted on the resource. If you are charged with assigning rights and permissions on systems, your ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required