ITsVISTA
Information that makes life easier when it comes to installing, managing, and using Windows Vista.
Start About FAQ Blogroll Shop

All tag results for ‘Authentication’

KB2583709

August 10th, 2011 · No Comments · 1,179 views

In a network environment, you try to use Group Policy to deploy 802.1X authentication settings to a client computer that is running Windows Vista or Windows Server 2008. In this situation, the client computer incorrectly uses the built-in local default 802.1X profile before the Group Policy profile is applied.

This behavior causes the operating system to start authentication based on the built-in local authentication settings. Therefore, the computer connects to the wrong network or fails authentication instead of successfully connecting to the corporate network.

Note: Disconnecting and then reconnecting the network connection, restarting the Wired AutoConfig (dot3svc) service, or restarting the computer will typically enable the authentication to complete successfully.

KB2523201

April 14th, 2011 · 1 Comment · 914 views

Consider the following scenario:

  • You have a client computer that is running Windows Vista or Windows Server 2008.
  • You configure a web server to use cookie-based authentication for client users in the network environment.
  • The web server creates cookies that contain the authentication information when the client user logs on the web server for the first time.

In this scenario, the authentication information is deleted unexpectedly after you access some resources on the web server. Therefore, a logon prompt is displayed if you access the resources on the web server again.

KB2028484

October 13th, 2010 · No Comments · 1,348 views

Consider the following scenario:

  • You have a computer that is running Windows Server 2008 or Windows Vista.
  • You use Kerberos authentication to connect to lots of remote computers at the same time.

In this scenario, you experience the following issues on the computer:

  • Unexpectedly high CPU usage in the Lsass.exe process
  • Poor Kerberos authentication performance

KB981210

April 26th, 2010 · No Comments · 3,000 views

UpdatesDescription: This security update resolves two privately reported vulnerabilities in Windows Authenticode Verification that could allow remote code execution. An attacker who successfully exploited either vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. The security update addresses the vulnerabilities by performing additional verification operations when signing and verifying a portable executable or cabinet file. Keep reading →

KB981210

April 26th, 2010 · No Comments · 2,549 views

UpdatesDescription: This security update resolves two privately reported vulnerabilities in Windows Authenticode Verification that could allow remote code execution. An attacker who successfully exploited either vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.The security update addresses the vulnerabilities by performing additional verification operations when signing and verifying a portable executable or cabinet file. Keep reading →

KB981210

April 23rd, 2010 · No Comments · 2,513 views

UpdatesDescription: This security update resolves two privately reported vulnerabilities in Windows Authenticode Verification that could allow remote code execution. An attacker who successfully exploited either vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
The security update addresses the vulnerabilities by performing additional verification operations when signing and verifying a portable executable or cabinet file. Keep reading →

KB977656

December 29th, 2009 · No Comments · 1,360 views

Consider the following scenario:

  • You have a computer that is running Windows Vista or Windows Server 2008.
  • You create a new incoming connection by using static IP addresses from the static IP address pool.
  • You use only one of the following authentication protocols as the authentication for the incoming connection:
    • Challenge Handshake Authentication Protocol (CHAP)
    • Password Authentication Protocol (PAP)

In this scenario, you cannot start a virtual private network (VPN) connection to this computer from a client computer that is running Windows XP, Windows Server 2003, or Windows Vista.

KB971737

December 13th, 2009 · No Comments · 2,151 views

This article describes a nonsecurity update which implements Extended Protection for Authentication in Microsoft Windows HTTP Services (WinHTTP).

When Extended Protection for Authentication is enabled, authentication requests are bound to both the Service Principal Names (SPN) of the server to which the client tries to connect and to the outer Transport Layer Security (TLS) channel over which the Integrated Windows authentication occurs.

To use the features that this update includes, update 968389 must be installed on the computer. For more information, click the following article number to view the article in the Microsoft Knowledge Base:
968389 Extended Protection for Authentication

KB973917

December 13th, 2009 · 1 Comment · 1,097 views

This article describes a non-security update that implements Extended Protection for Authentication in Internet Information Services (IIS).

When Extended Protection for Authentication is enabled, authentication requests are bound to both the Service Principal Names (SPN) of the server to which the client tries to connect and to the outer Transport Layer Security (TLS) channel over which Integrated Windows Authentication happens.

KB970430

December 13th, 2009 · 1 Comment · 1,602 views

This article describes a non-security update which implements Extended Protection for Authentication in the HTTP Protocol Stack (http.sys).

When Extended Protection for Authentication is enabled, authentication requests are bound to both the Service Principal Names (SPN) of the server, the client tries to connect to and to the outer Transport Layer Security (TLS) channel over which the Integrated Windows Authentication authentication occurs.

To use the features that this update includes, you must have the update 968389 installed on the computer. For more information, click the following article number to view the article in the Microsoft Knowledge Base:
968389 Extended Protection for Authentication