2.3.1 Dependencies on This System

Because Authentication Services authenticate users, computers, and security services in a domain environment, any system or protocol that operates within a domain or has a mode of operation within a domain is influenced by this system. However, the following groups of related protocols depend more closely on the Authentication Services protocols:

Active Directory [MS-ADOD]: Describes how the directory is structured and how LDAP operations are carried out on the directory store. To authenticate the identities of clients that attempt to operate on the directory store, Active Directory uses the Authentication Services protocols to authenticate so that authorization decisions can be made, such as whether a client has permission to perform a particular operation against a directory object.

Certificate Services [MS-CERSOD]: Describes how the certificate authority leverages the Authentication Services protocols to manage certificate distribution and enrollment and makes authorization decisions that are based on information that is associated with the accounts in the domain.

File Access Services [MS-FASOD]: Describes its dependance on the Authentication Services protocols to authenticate an identity before it is determined whether the requested identity has the required access rights on a file object, such as permission to read from a file or write to a file.

Group Policy Protocols [MS-GPOD]: Describes how a domain client can retrieve group policy information from a domain controller, which is based on the group memberships of the domain accounts and on the domain account locations in the LDAP directory structure. Group Policy protocols depend on the Authentication Services protocols to secure communications between the Group Policy client and the Group Policy server.

Remote Desktop Services Protocols [MS-RDSOD]: Describes the functionality to securely connect remote clients and servers, to channel communication between components of remote clients and servers, and to manage servers. RDP protocols depend on the services of the Authentication Services protocols to authenticate identities and to help ensure secure communications.