Designing an Authentication Strategy
Most organizations need to support seamless access to the network for multiple types of users, such as workers in offices, employees who are traveling, and perhaps even business partners and customers. At the same time, organizations need to protect network resources from potential intruders. A well-designed authentication strategy can help you achieve this complex balance between providing reliable access for users and strong network security for your organization.
In This Chapter
For more information about the Kerberos version 5 authentication protocol, see the Windows Security Collection of the Windows Server 2003 Technical Reference (or see the Windows Security Collection on the Web at http://www.microsoft.com/reskit).
For more information about the Active Directory® directory service logical structure, see "Designing the Active Directory Logical Structure" in this book.
For more information about upgrading from the Microsoft® Windows NT® version 4.0 operating system to the Microsoft® Windows® Server 2003 operating system, see "Upgrading Windows NT 4.0 Domains to Windows Server 2003 Active Directory" in this book.