Hello,

I am trying to find some information that describes the process gone through
when a resource is requested on an NT network by a client that is not
authenticated.  For instance on a 9x machine that is not logged into a
domain, but has a connection on a network, what happens when they request
use of a file located on an NT machine.  (Specifically ones running NT 4.0
server service pack 6a, or Windows 2000 server service pack 2.)

I'm also interested in what happens with clients such as VPN users who are
not authenticated before they access the network by virtue of how VPNs work.

I have read the stuff I can find (but am always interested in more) on what
happens when a user logs into a domain and how authentication proceeds at
that time, but I'm interested in the other cases and haven't been able to
find anything on it.

Thanks in advance,  

Teresa 

------
You are subscribed as [email protected]
Archives: http://www.swynk.com/sitesearch/search.asp
To unsubscribe send a blank email to [EMAIL PROTECTED]

Reply via email to