- [Voiceover] In this section I'd like to talk…about authentication on a small network.…Authentication is when you prove that…you are who you say you are.…In other words if I walk up to a machine…and I tell that machine, "I am the administrator."…It doesn't just take my word for it.…I have to do something to prove I am the administrator,…and typically that is typing in a password.…Most of our authentication is…based on username and password.…On a small network we can have authentication…done by each individual machine.…
So each machine would maintain its…own list of usernames and passwords.…In some operating systems the requirement…for a password is optional.…I usually recommend turning that on.…Go ahead and force every account to need…a password in addition to the username.…And these usernames will be used for our…file sharing so if you want to do file sharing,…making sure everyone has their…own account is very important.…If you use the local machine to do…your authentication you may have to create…accounts on multiple machines.…
Author
Released
9/14/2014- Explain when and how collisions occur.
- Determine the types of cords used to connect a computer to switches and routers.
- Identify the function of a reversed access point.
- Recall the limitations of an incorrectly configured DNS.
- Recognize the capabilities of Link-Layer Topology Discovery.
- List the dialog steps in Mac used to add an Active Directory service.
- Explore the AVG antispam settings.
Skill Level Beginner
Duration
Views
Related Courses
-
3ds Max 2013 Essential Training
with Aaron F. Ross7h 9m Beginner
-
Introduction
-
Welcome53s
-
-
1. Basic Networking
-
Using Ethernet4m 19s
-
Understanding IPv43m 52s
-
-
2. Wireless vs. Wired
-
Working with wired networks3m 36s
-
-
3. Purposes of Different Servers
-
Using directory services1m 22s
-
Serving email3m 15s
-
Serving a website2m 33s
-
4. Platform-Specific Tips and Tricks
-
Exploring some tips for Windows10m 32s
-
-
5. Working in a Multiplatform Environment
-
Creating a Mac file share1m 39s
-
6. Connecting to the Internet
-
7. Storage and Backups
-
8. Security
-
Using encryption4m 9s
-
Using authentication1m 52s
-
9. Maintenance
-
Conclusion
-
Wrapping up52s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Using authentication