Enabling Supplemental Authentication Strategies
Updated: March 28, 2003
Applies To: Windows Server 2003, Windows Server 2003 R2, Windows Server 2003 with SP1, Windows Server 2003 with SP2
Some organizations require more complex authentication solutions to meet their user access needs. For example, if your organization includes Web-based clients that use applications such as Microsoft® Internet Explorer to access data stored on back-end servers, you must enable complex authentication strategies, such as delegation, constrained delegation, and protocol transfer, to allow those clients to access the requested services in a secure manner.
For a worksheet to assist you in documenting your plan for enabling supplemental authentication strategies, see "Supplemental Authentication Strategies" (DSSAUT_4.doc) on the Windows Server 2003 Deployment Kit companion CD (or see "Supplemental Authentication Strategies" on the Web at http://www.microsoft.com/reskit).
Figure 14.9 shows the process for enabling supplemental authentication strategies.
Figure 14.9 Enabling Supplemental Authentication Strategies