Inside Windows Server 1002003 [Electronic resources]

Addison Wesley

نسخه متنی -صفحه : 245/ 231
نمايش فراداده

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Kbdclass.sys drivers

Kbdus.dll drivers

KCC (Knowledge Consistency Checker) 2nd

KDC

(Key Distribution Center)

Kerberos

Kerberized applications

MITv5 Kerberos 2nd 3rd 4th

Kerberized services

Kerberos 2nd 3rd 4th 5th 6th 7th 8th 9th

authentication functions

authenticator 2nd

authorization data 2nd 3rd 4th 5th 6th 7th 8th 9th

clients

cross-domain authentication 2nd 3rd 4th

impersonation of 2nd

KDC (Key Distribution Center)

Kerberized services

Kerberos database

KRBTGT accounts

member servers

authentication 2nd 3rd 4th 5th 6th

MITv5 Kerberos

cross-realm architecture 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th

cross-realm trusts 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th

interoperability 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st

Kerberized applications 2nd 3rd 4th

references 2nd

Mixed domains

mutual authentication 2nd

name

origin

name mapping

PACs (Privilege Access Certificates) 2nd 3rd 4th 5th 6th

policies 2nd 3rd

ports

preauthenticator 2nd

realms

reply messages

elements

security package

security principals

service locations

services

short-cut trusts 2nd

situations for

SPNs (Service Principal Names) 2nd 3rd 4th 5th

ticket-granting function

tickets 2nd 3rd 4th 5th 6th 7th

viewing

timestamps

transactions 2nd 3rd 4th 5th

analysis 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th

validating server

vocabulary 2nd 3rd 4th 5th 6th

Kerberos FAQ Web site

Kerberos realm trusts

Active Directory

Kerberos trusts

Active Directory

Kerberos V5 Installation Guide Web site

Kerberos\

An Authentication_Service for Computer Networks Web site

Kerbtray utility

Kernel memory

dumps

kernel memory usage

tracking 2nd 3rd 4th 5th

kernel object auditing

kernels

initialization

Key Distribution Center (KDC). [See KDC (Key Distribution Center)]

Key Recovery Agents 2nd 3rd

Key Usage entity (certificates)

keys

(Registry)

archiving 2nd

PKI

private key services 2nd

public key services 2nd 3rd 4th 5th 6th

recovery

recovering 2nd 3rd 4th 5th

Key Recovery Agents 2nd 3rd

redirectors

storage 2nd 3rd

KILL utility

KLIST command-line utility

Knowledge Consistency Checker (KCC) 2nd

KRA (Key Recovery Agent) container (Enterprise CAs)

KRBTGT accounts

Kerberos

Ksecdd.sys drivers