I am really interested in understanding where the bits of the token are taken from. We have remote users and cross domain users that occasionally have problems accessing resources when everything looks like is 'should' work, so I'm trying to gain a deeper understanding of the process so I can see if I can find a possible place where the process is breaking down.
-----Original Message----- From: Flanagan, Kevin [mailto:[EMAIL PROTECTED]] Sent: Tuesday, February 19, 2002 7:30 AM To: MSWinNT Discussions Subject: RE: Authentication to resources Teresa, The process is essentially the same, if a user signs on to a Win9x system they authenticate, that can be 2 ways, locally, or domain. When they do this they get the bits of information necessary to create a token. That token has the basic "Who I am" info, username, groups, who authenticated me, etc. When that user wants to connect to a resource that's on another system they present that token as "here's who I am". The system providing that resource then goes through the checks to see if that user with that token has access. The contents of the token is what's dramatically different depending on what authentication was done. Was that what you were looking for? Kevin +__________________________________________+ A fanatic is one who can't change his mind and won't change the subject. Winston Churchill Kevin M. Flanagan C/S Planning Engineer III IT Systems Implementation Branch Banking & Trust 3261 Atlantic Ave Suite 116 Raleigh, NC 27604 919-716-6209 > -----Original Message----- > From: Whitlock, Teresa [mailto:[EMAIL PROTECTED]] > Sent: Monday, February 11, 2002 1:43 PM > To: MSWinNT Discussions > Subject: Authentication to resources > > > > Hello, > > I am trying to find some information that describes the > process gone through when a resource is requested on an NT > network by a client that is not authenticated. For instance > on a 9x machine that is not logged into a domain, but has a > connection on a network, what happens when they request use > of a file located on an NT machine. (Specifically ones > running NT 4.0 server service pack 6a, or Windows 2000 server > service pack 2.) > > I'm also interested in what happens with clients such as VPN > users who are not authenticated before they access the > network by virtue of how VPNs work. > > I have read the stuff I can find (but am always interested in > more) on what happens when a user logs into a domain and how > authentication proceeds at that time, but I'm interested in > the other cases and haven't been able to find anything on it. > > Thanks in advance, > > Teresa > > ------ > You are subscribed as [EMAIL PROTECTED] > Archives: http://www.swynk.com/sitesearch/search.asp > To unsubscribe send a blank email to > [EMAIL PROTECTED] > ------ You are subscribed as [EMAIL PROTECTED] Archives: http://www.swynk.com/sitesearch/search.asp To unsubscribe send a blank email to [EMAIL PROTECTED] ------ You are subscribed as [email protected] Archives: http://www.swynk.com/sitesearch/search.asp To unsubscribe send a blank email to [EMAIL PROTECTED]
