Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Discuss the different methods of authentication supported between Microsoft’s We

ID: 3855516 • Letter: D

Question

Discuss the different methods of authentication supported between Microsoft’s Web server (Internet Information Services) and Microsoft Explorer and Google Chrome. Ensure that you cover both basic authentication and Microsoft’s challenge-response scheme. Support your answer with material from the textbook or the academic literature. Your sources of information must be cited within the content of your answer and the references listed after your signature, following the APA style. Only peer-reviewed references are acceptable.

Explanation / Answer

Hi,

Below is the answer-

1. Anonymous Authentication-
Anonymous authentication gives users access to the public areas of your Web site without prompting them for a user name or password. When a user attempts to connect to your public Web site, your Web server assigns the user to the Windows user account called IUSR_<computername>, where <computername> is the name of the server on which IIS is running.
By default, the IUSR_<computername> account is included in the Windows user group Guests. This group has security restrictions, imposed by NTFS permissions that designate the level of access and the type of content available to public users.
2. Basic Authentication-
The Basic authentication method is a widely used, industry-standard method for collecting user name and password information. Basic authentication proceeds as follows:
a) The Web browser on the client computer displays a dialog box where users can enter their previously assigned Windows 2000 account user names and passwords.

b) The Web browser then attempts to establish a connection using this information. (The password is Base64 encoded before being sent over the network).

c) If the server rejects the information, the Web browser repeatedly displays the dialog box until the user either enters a valid user name and password or closes the dialog box.

3. Integrated Windows Authentication-
Integrated Windows authentication is a secure form of authentication because the user name and password are not sent across the network. When you enable integrated Windows authentication, the browser of the user proves its knowledge of the password through a cryptographic exchange with your Web server, involving hashing. (The authentication credentials pass through a one-way process, often referred to as hashing. The result of this process is called a hash, or message digest, and it is not feasible to decrypt it. That is, the original text cannot be deciphered from the hash.)

Regards,

Vinay

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote