Understanding Authenticator Storage
Anytime you have an authenticator, you have to store some form of it so that it can be compared at run time to what the principal enters when authenticating. The storage method differs depending both on the type of authenticator and how the designer built the system.
In this section we will discuss various ways authenticators are stored in Windows, particularly focusing on passwords because they are more commonly used and subject to far more variation than smart cards.
Smart cards rely on certificates. (For more information about certificates, see Chapter 10.) The smart card itself holds the secret portion of the certificate. The authentication system, in this case an Active Directory domain, holds the public ...
Get Windows Server® 2008 Security Resource Kit now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.