• ▼MSDN Library - April 2000
    • ▶Welcome to the MSDN Library
    • ▶Visual Studio 6.0 Documentation
    • ▶Office Developer Documentation
    • ▶Windows CE Documentation
    • ▶Platform SDK
    • ▶SDK Documentation
    • ▶DDK Documentation
    • ▼Windows Resource Kits
      • About Windows Resource Kits
      • ▶BackOffice Resource Kit
      • ▶Microsoft Site Server 3.0 Commerce Edition Resource Kit
      • ▶Windows 95 Resource Kit
      • ▶Windows 98 Resource Kit
      • ▶Windows CE PC Companion Resource Kit
      • ▶Windows NT 3.51 Resource Kit
      • ▶Windows NT Server 4.0 Resource Kit
      • ▶Windows NT Workstation 4.0 Resource Kit
      • ▼Windows 2000 Server Resource Kit
        • Welcome
        • ▶Deployment Planning Guide
        • ▶Distributed Systems Guide
        • ▶TCP/IP Core Networking Guide
        • ▶Internetworking Guide
        • ▶Server Operations Guide
        • ▼Internet Information Services 5.0 Resource Guide
          • ▶Introduction
          • ▶Overview of Internet Information Services 5.0
          • ▶Managing the Migration Process
          • ▶Migrating a Web Server to IIS 5.0
          • ▶Capacity Planning
          • ▶Monitoring and Tuning Your Server
          • ▶Developing Web Applications
          • ▶Data Access and Transactions
          • ▶Administering an ISP Installation
          • ▼Security
            • ▶Foundations of Computer Security
            • ▶Using the Built-in Security Features of Windows 2000 Server
            • ▼Configuring IIS 5.0 Security
              • ▼IIS 5.0 Authentication Modes
                • How Web Authentication Works
                • ▶Anonymous Web Authentication
                • Basic Authentication
                • ▶Integrated Windows Authentication
                • ▶Digest Authentication
                • ▶Client Certificate Mapping
                • ▼A Brief Overview of Certificate Services
                  • ▼IIS 5.0 Native Mapping
                    • One-to-One Mapping
                    • Many-to-One Mapping
                  • Windows Active Directory Mapping
                  • Certificate Trust Lists
                  • Caching and the Windows Audit Log
                • Web Authentication Summary
                • FTP Authentication
              • ▶Extending IIS 5.0 Security
              • ▶File and Directory Security
              • ▶Virtual Directory Security
              • ▶Secure Communications with SSL and TLS
              • ▶How Access Is Determined
              • ▶Troubleshooting Permissions
            • ▶An End-to-End Troubleshooting Example
            • ▶Defending Against Malicious Attacks
            • ▶Auditing Access with IIS 5.0 Logs
            • IIS 5.0 Security Checklist
            • Additional Resources
          • ▶Access to Legacy Applications and Data
          • ▶ASP Best Practices
          • ▶Site Security Planning
        • ▶Internet Explorer 5 Resource Kit
        • ▶Resource Kit Glossary
    • ▶Knowledge Base
    • ▶Technical Articles
    • ▶Backgrounders
    • ▶Specifications
    • ▶Books
    • ▶Partial Books
    • ▶Periodicals
    • ▶Samples