Logon documentation

  • Thread starter Thread starter cjobes
  • Start date Start date
C

cjobes

Does anybody have a good link to a document that discribes the sequence of
events (packets/protocol etc) when a domain user logs on to an XP box within
a W2K AD domain?

Thanks,

Claus
 
The link below may help and explains the kerberos process used which would
be the default authentication method. --- Steve

http://www.windowsitlibrary.com/Content/617/06/3.html


Single-domain logon
A single-domain logon occurs when the following takes place:


a.. Alice is logging on from a machine that is a member of the domain
where Alice's account has been defined (this is a local logon).
b.. Alice accesses a resource located on a machine that is a member of
Alice's logon domain (this is network logon).
Local logon
Figure 16 and the following list show what happens during a local logon in a
single-domain environment:


1.. Alice presses <CTRL><ALT><DEL> and chooses to log on to the domain.
2.. The client software acting on behalf of Alice tries to locate a KDC
service for the domain; this is done by querying DNS. The Kerberos package
will retry up to three times to contact a KDC. It initially waits ten
seconds for a reply and will wait an additional ten seconds on each retry.
In most cases a KDC is already known; the discovery of a DC is also part of
the secure channel setup that occurs before any local logon.
3.. Once the DC is found, Alice sends a Kerberos authentication request to
the DC. This request authenticates Alice to the DC and contains a TGT
request (KRB_AS_REQ).
4.. The Authentication Service authenticates Alice, generates a TGT, and
sends it back to the client (KRB_AS_REP).
5.. The local machine where Alice logged on is, as with any other domain
resource, a resource for which Alice needs a ticket. Alice sends a ticket
request to the DC using her TGT (together with an authenticator)
(KRB_TGS_REQ).
6.. The TGS of the DC checks the TGT and the authenticator, generates a
ticket for the local machine, and sends it back to Alice (KRB_TGS_REP).
7.. On Alice's machine, the ticket is presented to the Local Security
Authority, which will create an access token for Alice. From then on, any
process acting on behalf of Alice can access the local machine's resources.
 
Thanks for the answer. This helps partly. We need to troubleshoot some
connection problems with hardware VPNs and what I was after is what
protocols/ports are used. We suspect that ICMP doesn't get through but it
would be much easier for us if we would know what is send in the first place
so we can toubleshoot.

The remote users can connect to the Exchange server and mapped drives at HQ
but logins for any other user than the one that normaly works on the desktop
takes a long time. We have also noticed that GPs are not updated.

Does anybody have a link for this kind of info?

Thanks,

Claus
 
Back
Top