Overview of the Authentication Strategy Design Process
Updated: March 28, 2003
Applies To: Windows Server 2003, Windows Server 2003 R2, Windows Server 2003 with SP1, Windows Server 2003 with SP2
One of the most fundamental elements of an organization’s security strategy is verifying the identity of clients and granting them appropriate access to system resources based on their identity. By creating an authentication strategy for your organization, you can prevent attackers and malicious users from accessing and tampering with sensitive information, consuming computing power or other system resources, and impersonating users in order to send misleading or incorrect information.
Authentication technology in the Microsoft® Windows® Server 2003, Standard Edition; Windows® Server 2003, Enterprise Edition; and Windows® Server 2003, Datacenter Edition operating systems allows you to implement a variety of authentication strategies based on the complexity of your organization, the quality of a user’s credentials, the means by which users access the network, and the clients they use to gain access. In addition, Windows Server 2003 authentication technology allows you to establish a foundation for more efficient management of users, computers, and services on the network.
For a list of the job aids that are available to assist you in designing an authentication strategy, see "Additional Resources for Designing an Authentication Strategy" later in this chapter.