官术网_书友最值得收藏!

Chapter 2. Understanding the Claims-based Access Model

This chapter will explain the idea of identities and claims especially in the use of Windows 8 / Windows Server 2012 and higher. This chapter will also define how Kerberos Armoring and Compound Authentication works and how to manage claims and resource properties. Test lab will guide you to go deeper into the functionality of Dynamic Access Control (DAC). In this chapter you will learn about:

  • Understanding claims
  • Windows 8/ Windows Server 2012 and newer claims support
  • Kerberos Armoring and Compound Authentication
  • Managing claims and resource properties
  • Using Claim Transformation and Filtering
  • Groups or DAC, let's extend our first solution

By the end of this chapter you will have learned what a claim is and how to work with it. Furthermore, you will have configured a first advanced solution in the lab environment. The solution provides you an understanding about when to use groups or claims for authorization. Also, the situation in which a combination of both can help you to fulfill your requirements in configuring access control to your information stored on a file server.

主站蜘蛛池模板: 临海市| 明光市| 万年县| 容城县| 南宫市| 磐石市| 南宁市| 台北县| 绥棱县| 通河县| 赤峰市| 石林| 永仁县| 浪卡子县| 都兰县| 彩票| 长治县| 无极县| 六安市| 延津县| 鄂伦春自治旗| 正阳县| 内丘县| 万宁市| 当涂县| 富裕县| 英吉沙县| 阳西县| 海兴县| 元朗区| 丘北县| 拉萨市| 蓬安县| 洞头县| 皋兰县| 新泰市| 加查县| 台北市| 古交市| 惠东县| 昭通市|