Remote Access Services Authentication SummaryLast reviewed: November 11, 1997Article ID: Q136634 |
The information in this article applies to:
SUMMARYWindows NT Remote Access Services (RAS) supports several authentication and encryption methods. This article describes the these methods and provides examples of remote access clients that use them.
MORE INFORMATIONWindows NT RAS supports both the Password Authentication Protocol (PAP) and the Challenge-Handshake Authentication protocol (CHAP).
PAPPAP uses clear text (unencrypted) password authentication. It is supported by the Windows NT RAS server for interoperability with 3rd party PPP clients. NetManage Chameleon and Trumpet Winsock are 3rd Party PPP clients that use PAP.
CHAPCHAP requires a challenge response with encryption on the response. Windows NT RAS server supports the following encryption algorithms in conjunction with CHAP authentication:
RSA MD4 (or MS-CHAP) MS-CHAP is Microsoft's version of the RSA MD4 standard. This is the most secure encryption algorithm supported by Windows NT. MS-CHAP corresponds to the "Require Microsoft encrypted authentication" encryption setting for the RAS server. Both Windows NT and Windows 95 RAS clients will negotiate a PPP connection to a Windows NT RAS server using MS-CHAP as the encryption algorithm. DES DES is the encryption algorithm used by down-level Microsoft RAS clients such as Windows for Workgroups 3.11 RAS and RAS 1.1a. DES is supported by Windows NT for backward compatibility with down-level RAS clients. SPAP SPAP is Shiva's Password Authentication Protocol. Windows NT RAS server supports SPAP to allow dialin by Shiva clients. Unlike PAP, SPAP does send encrypted passwords over the wire as opposed to clear-text passwords. MD5 Service Pack 3 provides limited PPP MD5-CHAP authenticator support to the Remote Access Server, which may be useful for small user-count environments using non-Microsoft PPP dial-in clients. The support is local to a given RAS server. The MD5 account information is stored in the RAS server registry and is not integrated or synchronized with the User Manager account database. Integrated support will appear in a later release, at which time this limited support may be removed. The local MD5-CHAP authenticator is enabled by creating the MD5 key below and adding "account" subkeys of the form [<domain>:]<user>, with subvalue "Pw" containing the account password. The ":" notation is used instead of "\" due to the syntax rules of registry keys. The 'domain:' is optional and typically omitted. MD5-CHAP will not be negotiated (old behavior) when the MD5 key does not exist (default). HKLM\SYSTEM\CurrentControlSet\Services\RasMan\PPP\CHAP\MD5 [<domain>:]<user>(REG_SZ)Pw Encryption on Windows NT RAS Server
Encryption on the Windows NT RAS ClientThe Widows NT RAS client supports all authentication standards supported by the Windows NT RAS server except SPAP. Additionally, the Windows NT RAS client supports the RSA MD5-CHAP encryption standard. By supporting RSA MD5, Windows NT PPP clients are able to connect to almost all 3rd Party PPP Servers. The Windows NT RAS server does not support RSA MD5 because this method requires a clear-text password at the server.
|
Additional query words: prodnt 3.10 3.50 3.51 3.11 4.00 security Settings
© 1998 Microsoft Corporation. All rights reserved. Terms of Use. |