answersLogoWhite

0

Four types of authentication are used: (1) Kerberos and NTLM network logon for remote access to a server in another forest (2) Kerberos and NTLM interactive logon for physical logon outside the user's home forest (3) Kerberos delegation to N-tier application in another forest (4) UPN credentials.

User Avatar

Wiki User

12y ago

What else can I help you with?

Related Questions

How do you use authenticate in a sentence?

ex. " The AUTHENTIC manager has discharged. "


What is a good sentence for authenticate?

My birth certificate was authenticate on September 14, 1998


What is A code used to authenticate the source of a file or document or to identify and authenticate?

digital certificate A code used to authenticatethe source of a file or document or to identify and authenticate


What are the differences between tropical rain forests and deciduous forests?

ASK iJ!


What are grasslands that are located between deserts and rain forests?

Savannas are grassland transition zones between deserts and rain forests.


What are the similarities between cold forests and hot forests?

Ones hot, Ones cold.


How do you authenticate signatures on comics?

You can authenticate the signature , and grade of your book(s) , at the related link below .


The relationship between two domains in which one domain allows another domain to authenticate its users is known as?

Trust Relationship


How do authenticate something?

When you authenticate something you verify that it is genuine. For example, with certain kinds of memorabilia you can have it looked at by a professional.


How do you authenticate a Facebook page with no specific website to authenticate it to?

the page is "We Shouln't Have School After Superbowl" there is absolutely no website that this is related to! what do i do?!


Which encryption protocol uses pre-shared keys to authenticate users pre- shared keys to authenticate users?

WPA


What is the difference between Amazon and rain forests?

i am awesome