05.03.2013 Views

MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing ...

MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing ...

MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

1-24 Chapter 1 Introduction to Windows XP Professional<br />

Note If your computer is not part of a domain, the Log On To option is not available.<br />

Windows XP Professional Authentication Process<br />

F01US08.eps<br />

To gain access to a computer running Windows XP Professional or to any resource on<br />

that computer (whether the computer is configured to use the Welcome screen or the<br />

Log On To Windows dialog box), you must provide a user name and possibly a password.<br />

(You will learn more about using passwords effectively in Chapter 7.)<br />

The way Windows XP Professional authenticates a user depends on whether the user<br />

is logging on to a domain or logging on locally to a computer (see Figure 1-8).<br />

1<br />

Logging on<br />

locally<br />

Logs on<br />

3<br />

Access<br />

token<br />

Local<br />

security<br />

database<br />

Figure 1-8 Windows XP Professional grants an access token based on user credentials during the<br />

authentication process.<br />

The steps in the authentication process are as follows:<br />

2<br />

1. The user logs on by providing logon credentials—typically user name and password—and<br />

Windows XP Professional forwards this information to the security<br />

subsystem of that local computer.<br />

2. Windows XP Professional compares the logon credentials with the user information<br />

in the local security database, which resides in the security subsystem of the<br />

local computer.<br />

3. If the credentials are valid, Windows XP Professional creates an access token for<br />

the user, which is the user’s identification for that local computer. The access<br />

token contains the user’s security settings, which allow the user to gain access to<br />

the appropriate resources on that computer and to perform specific system tasks.<br />

Note In addition to the logon process, any time a user makes a connection to a computer,<br />

that computer authenticates the user and returns an access token. This authentication process<br />

is invisible to the user.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!