Solved

W2K authentication methods

Posted on 2003-12-10
3
235 Views
Last Modified: 2010-04-13
Ok im sure i sound confused

As i understand Windows 2000 has 2 authentication protocols, Kerberos which it uses for other W2K clients and NTLM which it uses with downlevel clients in mixed mode.

Now what are MS-CHAP and CHAP used for exacly? Are they just remote access authentication protocols?
0
Comment
Question by:mistaj
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 11

Accepted Solution

by:
adonis1976 earned 100 total points
ID: 9917199
this link explains what is CHAP

http://www.webopedia.com/TERM/C/CHAP.html

and this one is for MS CHAP

http://www.microsoft.com/windows2000/en/server/help/default.asp?url=/windows2000/en/server/help/sag_RASS_MSCHAPv2.htm

and you are right, they are remote authentication protocols.. further, MS CHAP is a Microsoft version of CHAP.
0
 
LVL 10

Expert Comment

by:BloodRed
ID: 9919779
There are more remote authentication protocols supported by Win2K if you're studying them; PAP, CHAP, SPAP, MS-CHAP(v1 and v2), EAP, EAP-TLS(digitial certs/smartcards) and RADIUS.  
0

Featured Post

Announcing the Most Valuable Experts of 2016

MVEs are more concerned with the satisfaction of those they help than with the considerable points they can earn. They are the types of people you feel privileged to call colleagues. Join us in honoring this amazing group of Experts.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Article by: Justin
In light of the WannaCry ransomware attack that affected millions of Windows machines, you might wonder if your Mac needs protecting. Yes, it does and here is how to do it.
This is a high-level webinar that covers the history of enterprise open source database use. It addresses both the advantages companies see in using open source database technologies, as well as the fears and reservations they might have. In this…
There's a multitude of different network monitoring solutions out there, and you're probably wondering what makes NetCrunch so special. It's completely agentless, but does let you create an agent, if you desire. It offers powerful scalability …

695 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question