Summary

In this chapter you got a look at how you can take a username and password and log that user into a domain so that you can use impersonation of that user to restrict access to resources on the server and network. This can be a powerful means of implementing integrated security into a networked application, leveraging the security profiles that the network administrator is already configuring and maintaining.

In the next chapter, you'll begin to learn how to access and interact with Active Directory servers using the Active Directory Security Interface (ADSI). This will include connecting to the Active Directory server using the Kerberos authentication protocol, as well as accessing NT 4 domains and computers. If you want to learn how to access Active Directory servers—as well as several other types of directory servers—using the ADSI interface, read on.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset