programming4us
programming4us
DESKTOP

Windows 8 : Determining who’s who through authentication (part 1) - How does Windows authenticate users accessing the system?

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019

What is authentication and what does it do?

Authentication, in a general sense, is a way for an entity to verify who you are when you use a service. For example, when you travel, you often use photo identification to verify your identity. Similarly, when you access an automated teller machine (ATM), your bank card information and personal identification number (PIN) verify that you can access your account.

Windows uses authentication to prove that the people using a computer system are who they claim to be. Usually users do this by providing a user name and a password to the system for verification. If either of these is incorrect or does not exist, the user is denied access to the system.


How does Windows authenticate users accessing the system?

Windows can authenticate a user account in several ways to prove the identity of the person at the keyboard; these include:

  • User name and password.

  • Smart cards.

  • Certificates.

  • Biometric authentication.

Windows asks you to click a picture or perform another action to sign in, such as pressing Ctrl+Alt+Delete. You then type a user name and password or select another means of authentication to prove your identity to Windows. After you provide these credentials, Windows checks your credentials either locally or against an Active Directory domain controller to ensure that the credentials exist and are valid. If both of these are verified, your user account is allowed access to the computer, and a desktop is created and displayed. Figure 1 shows the initial sign-in screen, prompting the user to press Ctrl+Alt+Delete.

Windows sign-in prompt

Figure 1. Windows sign-in prompt

If the credentials provided are incorrect or do not exist, Windows displays a message explaining that the provided items are invalid. You are given an opportunity to enter your credentials again. Depending on the configuration of security policies, the credentials can be locked out after a specified number of attempts; this can prevent or deter malicious use or unwanted access to resources, but Windows does not require this configuration for authentication. Figure 2 displays an invalid sign-in attempt.

Invalid sign-in attempt

Figure 2. Invalid sign-in attempt

Other  
  •  Windows Server 2012 : Planning, implementing, and managing Group Policy (part 9) - Configuring WMI filtering
  •  Windows Server 2012 : Planning, implementing, and managing Group Policy (part 8) - Managing GPO links, Configuring security filtering
  •  Windows Server 2012 : Planning, implementing, and managing Group Policy (part 7) - Viewing infrastructure status, Creating GPOs
  •  Windows Server 2012 : Planning, implementing, and managing Group Policy (part 6) - Advanced Audit Policy Configuration
  •  Windows Server 2012 : Planning, implementing, and managing Group Policy (part 5) - User Rights Assignment, Security Options
  •  Windows Server 2012 : Planning, implementing, and managing Group Policy (part 4) - Refreshing Group Policy
  •  Windows Server 2012 : Planning, implementing, and managing Group Policy (part 3) - Configuring a central store, Using Starter GPOs
  •  Windows Server 2012 : Planning, implementing, and managing Group Policy (part 2) - Group Policy and Active Directory design
  •  Windows Server 2012 : Planning, implementing, and managing Group Policy (part 1) - Understanding policies vs. preferences
  •  Windows 8 : Monitoring, optimizing, and troubleshooting system health and performance (part 5) - Monitoring system resources by using Performance Monitor
  •  
    Top 10
    Free Mobile And Desktop Apps For Accessing Restricted Websites
    MASERATI QUATTROPORTE; DIESEL : Lure of Italian limos
    TOYOTA CAMRY 2; 2.5 : Camry now more comely
    KIA SORENTO 2.2CRDi : Fuel-sipping slugger
    How To Setup, Password Protect & Encrypt Wireless Internet Connection
    Emulate And Run iPad Apps On Windows, Mac OS X & Linux With iPadian
    Backup & Restore Game Progress From Any Game With SaveGameProgress
    Generate A Facebook Timeline Cover Using A Free App
    New App for Women ‘Remix’ Offers Fashion Advice & Style Tips
    SG50 Ferrari F12berlinetta : Prancing Horse for Lion City's 50th
    - Messages forwarded by Outlook rule go nowhere
    - Create and Deploy Windows 7 Image
    - How do I check to see if my exchange 2003 is an open relay? (not using a open relay tester tool online, but on the console)
    - Creating and using an unencrypted cookie in ASP.NET
    - Directories
    - Poor Performance on Sharepoint 2010 Server
    - SBS 2008 ~ The e-mail alias already exists...
    - Public to Private IP - DNS Changes
    - Send Email from Winform application
    - How to create a .mdb file from ms sql server database.......
    programming4us programming4us
    programming4us
     
     
    programming4us