Export (0) Print
Expand All

Overview of the Authentication Strategy Design Process

Updated: March 28, 2003

Applies To: Windows Server 2003, Windows Server 2003 R2, Windows Server 2003 with SP1, Windows Server 2003 with SP2

One of the most fundamental elements of an organization’s security strategy is verifying the identity of clients and granting them appropriate access to system resources based on their identity. By creating an authentication strategy for your organization, you can prevent attackers and malicious users from accessing and tampering with sensitive information, consuming computing power or other system resources, and impersonating users in order to send misleading or incorrect information.

Authentication technology in the Microsoft® Windows® Server 2003, Standard Edition; Windows® Server 2003, Enterprise Edition; and Windows® Server 2003, Datacenter Edition operating systems allows you to implement a variety of authentication strategies based on the complexity of your organization, the quality of a user’s credentials, the means by which users access the network, and the clients they use to gain access. In addition, Windows Server 2003 authentication technology allows you to establish a foundation for more efficient management of users, computers, and services on the network.

Note

Was this page helpful?
(1500 characters remaining)
Thank you for your feedback

Community Additions

ADD
Show:
© 2014 Microsoft