When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Kerberos (protocol) - Wikipedia

    en.wikipedia.org/wiki/Kerberos_(protocol)

    Kerberos (/ ˈ k ɜːr b ər ɒ s /) is a computer-network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner.

  3. Integrated Windows Authentication - Wikipedia

    en.wikipedia.org/wiki/Integrated_Windows...

    Integrated Windows Authentication (IWA) [1] is a term associated with Microsoft products that refers to the SPNEGO, Kerberos, and NTLMSSP authentication protocols with respect to SSPI functionality introduced with Microsoft Windows 2000 and included with later Windows NT-based operating systems.

  4. Security Support Provider Interface - Wikipedia

    en.wikipedia.org/wiki/Security_Support_Provider...

    Security Support Provider Interface (SSPI) is a component of Windows API that performs security-related operations such as authentication.. SSPI functions as a common interface to several Security Support Providers (SSPs): [1] A Security Support Provider is a dynamic-link library (DLL) that makes one or more security packages available to apps.

  5. Pluggable Authentication Module - Wikipedia

    en.wikipedia.org/wiki/Pluggable_authentication...

    A pluggable authentication module (PAM) is a mechanism to integrate multiple low-level authentication schemes into a high-level application programming interface (API). PAM allows programs that rely on authentication to be written independently of the underlying authentication scheme.

  6. Single sign-on - Wikipedia

    en.wikipedia.org/wiki/Single_sign-on

    Integrated Windows Authentication is a term associated with Microsoft products and refers to the SPNEGO, Kerberos, and NTLMSSP authentication protocols with respect to SSPI functionality introduced with Microsoft Windows 2000 and included with later Windows NT-based operating systems.

  7. Domain controller - Wikipedia

    en.wikipedia.org/wiki/Domain_controller

    The software and operating system used to run a domain controller usually consists of several key components shared across platforms.This includes the operating system (usually Windows Server or Linux), an LDAP service (Red Hat Directory Server, etc.), a network time service (ntpd, chrony, etc.), and a computer network authentication protocol (usually Kerberos). [4]

  8. Generic Security Services Application Program Interface

    en.wikipedia.org/wiki/Generic_Security_Services...

    RFC 1964 The Kerberos 5 GSS-API mechanism; RFC 4121 The Kerberos 5 GSS-API mechanism: Version 2; RFC 4178 The Simple and Protected GSS-API Negotiation Mechanism (SPNEGO) RFC 2025 The Simple Public-Key GSS-API Mechanism (SPKM) RFC 2847 LIPKEY - A Low Infrastructure Public Key Mechanism Using SPKM "Common Authentication Technology Next Generation ...

  9. NTLM - Wikipedia

    en.wikipedia.org/wiki/NTLM

    According to an independent researcher, this design decision allows Domain Controllers to be tricked into issuing an attacker with a Kerberos ticket if the NTLM hash is known. [20] Microsoft adopted Kerberos as the preferred authentication protocol for Windows 2000 and subsequent Active Directory domains. [16]