Site Security Planning

Previous Topic Next Topic

Strong Authentication

Use authentication schemes that are integrated with your network operating systems, and that use Internet standard protocols. Examples:

You might also need to support special functions such as smart-card authentication, or server certificates with public keys that allow users to authenticate your servers as trusted sources.


© 1997-1999 Microsoft Corporation. All rights reserved.