answersLogoWhite

0


Best Answer

The domain controller is used to authenticate the user and the operation master role is PDC emulator.It uses kerberos protocol to authenticate

User Avatar

Wiki User

14y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: To complete the authentication process in a domain what must be contacted in Windows 2000?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What statement Correctly describes identification and authentication?

Identification is part of the authentication process.


What is a multi factor authentication?

Multi Factor Authentication is the process where authentication requirement two or more factors to determine the identity of a user. Such factors can be knowledge, possession or inherence.


What is Computer Authentication?

Authentication is a process in which the credentials provided are compared to those on file in a database of authorized users' information on a local operating system or within an authentication server. If the credentials match, the process is completed and the user is granted authorization for access.


When will an ED admit a patient to the hospital?

Emergency dept. physicians do not admit patients to the hospital. The primary care physician (PCP) must be contacted to complete the process.


When will an ED physician admit a patient to the hospital?

Emergency dept. physicians do not admit patients to the hospital. The primary care physician (PCP) must be contacted to complete the process.


What is the function and purpose of authentication services?

Authentication services are used to determine infusers are who they claim to be and are allowed to access what they are trying to access. The purpose of authentication is to protect devices, hosts, and services of a network. Authentication ensures the identity of the entity wanting access. Authentication is the process of determining if a user or identity is who they claim to be. The main goal of authentication is security, authentication is one of the first lines of defense in networking.


What is authentication in terms of computer access?

It is a process of verifying the user is who they say they are.


What is the type of malware designed to bypass normal authentication process?

Backdoor


What is your authenication?

Authentication is the process of verifying whether a user is authorized or not . We use authentication where we need security that only aurthorized people can have access to a particular data.


At what point in the PPP connection process does the authentication phase occur?

before LCP begins the link establishment process


Is the process that requires a user to prove he or she has permission to access a computer network?

Authentication.


How does someone learn how to download Windows 8?

If one goes to the Windows online site, one can easily complete the download process. It gives you step by step instructions as to what needs to be done.