Logon and Authentication
Applies To: Windows Server 2003 R2, Windows Server 2003 with SP1, Windows Server 2003 with SP2
This page lists resources for logon and authentication in Windows Server 2003, which includes passwords, Kerberos, NTLM, Transport Layer Security/Secure Sockets Layer (TLS/SSL), and Digest. In addition, some protocols are combined into authentication packages, such as Negotiate and Schannel, as part of an extensible authentication architecture.
Planning and Architecture
-
This topic lists best practices for passwords.
Stored User Name and Password Best practices
This topic lists best practices for stored user names and passwords.
Deployment
Designing an Authentication Strategy
This deployment guide provides information about creating a foundation for authentication, securing the authentication process, extending your authentication framework, enabling supplemental authentication strategies, and educating users about the authentication process.
Account Passwords and Policies in Windows Server 2003
This white paper describes the reasons why you should take a structured approach to setting the account and password policy features and provides information about the tools and log files that you can use to troubleshoot account lockouts. In addition, it shows you how to determine from which computer the account lockouts are being generated, as well as the program or service that is generating the lockout.
Operations
Authentication Protocol How To...
Procedures are available for the following authentication tasks:
-
Procedures are available for the following password tasks:
Technical Reference
Logon and Authentication Technologies
The following technical references are available for logon and authentication technologies:
Troubleshooting
Additional Resources
For changes in logon and authentication from Windows Server 2003 to Windows Server 2008, see What's New for Identity Management in Windows Server 2008.
For more information about logon and authentication in Windows Server 2008, see Windows Authentication.
For information about Kerberos authentication, see Kerberos Authentication.