• Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Chapter 20. A Network Security Primer > Working with User Accounts

Working with User Accounts

A user can’t log on to a network without a valid username and password. Therefore, user accounts are really the network administrator’s first line of defense as far as network security is concerned. When a user logs on to the network from a client computer, her username and password are used to generate an access token. This access token validates the user to the network (allowing the logon) and also is used to determine the access level that the user will have to resources on the network.

The access token, which is a concept that you run into no matter what NOS you are using, is kind of an electronic identification card, not that different from an ATM card, really. An ATM card validates you to your bank’s ATM network and allows you to access certain resources, such as your checking or savings account. The access token generated in relation to your username is also used to determine the resources that you can negotiate on the network and the degree of access you can have.


PREVIEW

                                                                          

Not a subscriber?

Start A Free Trial


  
  • Creative Edge
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint