Front cover; Contents; Acknowledgments; About the Author; About This Book; Chapter 1. User Identification and Authentication Concepts; Chapter 2. UNIX User Authentication Architecture; Chapter 3. Windows User Authentication Architecture; Chapter 4. Authenticating Access to Services and Applications; Chapter 5. Authenticating Access to the Infrastructure; Appendix A: References; Appendix B: Lab Configuration; Appendix C: Indices of Tables and Figures; Index; Back cover.
User identification and authentication are absolutely essential to modern security. This book presents the general philosophy of user authentication and access control. It introduces key concepts and outlines the process of controlled access to resources through authentication, authorization, and accounting.