Question

In: Computer Science

Answer the below quesions in short using your own words - Explain Windows User Authentication process...

Answer the below quesions in short using your own words


- Explain Windows User Authentication process on Local Windows Machine.

- Explain the Windows User Authentication process for Client connecting to the domain

- How NTLM work for Windows User Authentication process

Solutions

Expert Solution

  1. On local Machine: When we use login on a local account, machine performs logon as well as authentication. The authentication is performed over the machine the account resides. The credentials are verified by windows credential management. Operating system uses windows credential management process to receive the credentials from a user. By default, they are validated by Security account manager (SAM), database on the local machine.
  2. Over network: In case of a client connected domain, the target is the domain controller. The credentials which are used here are digital documents linked to the account. In this case, Credentials are stored in active directory on a domain-joined computer.
  3. The subsequent steps present the framework of NTLM non-interactive authentication. In the first step, user's NTLM credentials are provided & rest occurs as a part of the interactive authentication (logon) process.
    1. (Interactive authentication only) A user accesses a client computer and provides a domain name, user name, and password. The client computes a cryptographic hash of the password and discards the actual password.
    2. The client sends the user name to the server (in plaintext).
    3. The server generates a 16-byte random number, called a challenge or nonce, and sends it to the client.
    4. The client encrypts this challenge with the hash of the user's password and returns the result to the server. This is called the response
    5. The server sends the following three items to the domain controller
      1. Username
      2. Challenge
      3. Response
    6. The domain controller uses the user name to retrieve the hash of the user's password from the Security Account Manager database. It uses this password hash to encrypt the challenge

The domain controller compares the encrypted challenge it computed (in step 6) to the response computed by the client (in step 4). If they are identical, authentication is successful.


Related Solutions

Using short essay format and in your own words, answer the following questions. These do not...
Using short essay format and in your own words, answer the following questions. These do not need to be lengthy. Turn it as a word document via the View/Complete Assignment link below. 1. What is a nutrient? Name the six classes of nutrients found in foods. What is an essential nutrient? 2. Which nutrients are inorganic, and which are organic? Discuss the significance of that distinction. 3. Which nutrients yield energy, and how much energy do they yield per gram?...
Using short essay format and in your own words answer the following questions. 1. List and...
Using short essay format and in your own words answer the following questions. 1. List and briefly describe the lifestyle behaviors that have an impact on health and aging. 2. Describe physiological aging and lifestyle factors which can modify the process. 3. Describe the energy and nutritional needs of older adults. 4. Describe disease of the aging brain and the role of nutrition in brain function. 5. What factors of the immune system protect people from infectious diseases, and what...
. In your own words , explain the predominant aging mechanisms in the short-term and the...
. In your own words , explain the predominant aging mechanisms in the short-term and the long-term aging in bituminous materials.?
Answer the following questions below in your own words (NO PLAGIARISM) A- Answer the following questions...
Answer the following questions below in your own words (NO PLAGIARISM) A- Answer the following questions (300 words): Reflect on your experiences realizing your gender: How did you learn about your gender? What happened? What gender “rules” were you aware of in this experience? B- Answer the following questions (300 words) Reflect on your experiences learning about sexuality: Where did you learn about sexuality? What did you learn? How was it gendered? What do you think it should include for...
Solve the below questions using your own words PLEASE!! Make sure to write by your own...
Solve the below questions using your own words PLEASE!! Make sure to write by your own words or paraphrase 1. What is the difference between Windows and Linux server 2. Give some advantages and disadvantages Windows and Linux Operating System
Discuss, in your own words using 500 words or more, how business process as a service...
Discuss, in your own words using 500 words or more, how business process as a service (BPaaS) reduces risk for commercial enterprises. Don't rewrite already existing chegg anw
Explain briefly the below products of cloud platform using your own words. Security, Identity and Compliance...
Explain briefly the below products of cloud platform using your own words. Security, Identity and Compliance Internet of things Machine learning Mobile services Developer tools Cloud storage Networking Blockchain Databases Private Cloud
Using your own words; solve the question below Explain what an (OLAP) system does. Why are...
Using your own words; solve the question below Explain what an (OLAP) system does. Why are data in databases volatile? What are the differences between databases and data warehouses? Why might a company invest in a data mart? Describe data mining. What is text mining? What are the business benefits of BI?
Using your own words, explain the purpose of using the reset instruction with CTU.
Using your own words, explain the purpose of using the reset instruction with CTU.
Respond to and answer the following scenarios and questions: A. In your own words, explain the...
Respond to and answer the following scenarios and questions: A. In your own words, explain the concept of the multiplier. B. Approximately 1,500 out-of-town epidemiologists attended their annual convention in June of 2017. It was the largest convention ever held in the city of Boise. The average amount spent by an out-of-town convention attendee is $280 dollars per day. Assume the convention lasts 3 days, and the marginal propensity to consume is .50. How much will businesses in Boise benefit...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT