Export (0) Print
Expand All
This topic has not yet been rated - Rate this topic

2.2 Authentication Services Functionality

This section provides a general overview of how the core protocols operate as a group to provide authentication services, followed by an individual view of each core protocol.

The Implementation Scenarios section, later in this document, provides examples that illustrate the interaction of some of the protocols in two sample configurations.

Did you find this helpful?
(1500 characters remaining)
Thank you for your feedback
© 2014 Microsoft. All rights reserved.