The process by which a user’s credentials are verified by a network security authority so that the user can be granted access to the machine. Logons can be one of two types:
When a user attempts an interactive logon to a machine, the user’s credentials are verified by a security authority, which can be one of the following:
In a Windows 2000–based network that uses the domain security model, the directory database is the database component of Active Directory. A successful logon to a machine running Windows NT or Windows 2000 results in an access token being granted to the user, which enables the user to access shared resources on the network for which he or she has suitable permissions.