How authentication is used: Since a large part of the
entire networking process involves one computer requesting something from
another computer. A Web page client might ask for a Web page, for example, or a
Common Internet File System (CIFS) client might ask a file server for access to
a folder.
A computer far away might ask another computer for access
to a private network. Whatever the case, it is important to carefully assign
levels of access to your resources, this process is known as authorization, and
an access control list can help define how to assign levels of access.
Comments
Post a Comment