- Windows Logon Scenarios
- Interactive logon
- Local and domain logon
- Remote logon
- Network logon
- Smart card logon
- Biometric logon
- Additional resources
- Windows Logon Process
- Содержание
- Краткий обзор
- Критичность процесса Winlogon
- Функции Winlogon
- Winlogon и вредоносные программы
- Смотреть что такое «Windows Logon Process» в других словарях:
Windows Logon Scenarios
Applies To: Windows Server (Semi-Annual Channel), Windows Server 2016
This reference topic for the IT professional summarizes common Windows logon and sign-in scenarios.
The Windows operating systems require all users to log on to the computer with a valid account to access local and network resources. Windows-based computers secure resources by implementing the logon process, in which users are authenticated. After a user is authenticated, authorization and access control technologies implement the second phase of protecting resources: determining if the authenticated user is authorized to access a resource.
The contents of this topic apply to versions of Windows designated in the Applies to list at the beginning of this topic.
In addition, applications and services can require users to sign in to access those resources that are offered by the application or service. The sign-in process is similar to the logon process, in that a valid account and correct credentials are required, but logon information is stored in the Security Account Manager (SAM) database on the local computer and in Active Directory where applicable. Sign-in account and credential information is managed by the application or service, and optionally can be stored locally in Credential Locker.
To understand how authentication works, see Windows Authentication Concepts.
This topic describes the following scenarios:
Interactive logon
The logon process begins either when a user enters credentials in the credentials entry dialog box, or when the user inserts a smart card into the smart card reader, or when the user interacts with a biometric device. Users can perform an interactive logon by using a local user account or a domain account to log on to a computer.
The following diagram shows the interactive logon elements and logon process.
Windows Client Authentication Architecture
Local and domain logon
Credentials that the user presents for a domain logon contain all the elements necessary for a local logon, such as account name and password or certificate, and Active Directory domain information. The process confirms the user’s identification to the security database on the user’s local computer or to an Active Directory domain. This mandatory logon process cannot be turned off for users in a domain.
Users can perform an interactive logon to a computer in either of two ways:
Locally, when the user has direct physical access to the computer, or when the computer is part of a network of computers.
A local logon grants a user permission to access Windows resources on the local computer. A local logon requires that the user has a user account in the Security Accounts Manager (SAM) on the local computer. The SAM protects and manages user and group information in the form of security accounts stored in the local computer registry. The computer can have network access, but it is not required. Local user account and group membership information is used to manage access to local resources.
A network logon grants a user permission to access Windows resources on the local computer in addition to any resources on networked computers as defined by the credential’s access token. Both a local logon and a network logon require that the user has a user account in the Security Accounts Manager (SAM) on the local computer. Local user account and group membership information is used to manage access to local resources, and the access token for the user defines what resources can be accessed on networked computers.
A local logon and a network logon are not sufficient to grant the user and computer permission to access and to use domain resources.
Remotely, through Terminal Services or Remote Desktop Services (RDS), in which case the logon is further qualified as remote interactive.
After an interactive logon, Windows runs applications on behalf of the user, and the user can interact with those applications.
A local logon grants a user permission to access resources on the local computer or resources on networked computers. If the computer is joined to a domain, then the Winlogon functionality attempts to log on to that domain.
A domain logon grants a user permission to access local and domain resources. A domain logon requires that the user has a user account in Active Directory. The computer must have an account in the Active Directory domain and be physically connected to the network. Users must also have the user rights to log on to a local computer or a domain. Domain user account information and group membership information are used to manage access to domain and local resources.
Remote logon
In Windows, accessing another computer through remote logon relies on the Remote Desktop Protocol (RDP). Because the user must already have successfully logged on to the client computer before attempting a remote connection, interactive logon processes have successfully finished.
RDP manages the credentials that the user enters by using the Remote Desktop Client. Those credentials are intended for the target computer, and the user must have an account on that target computer. In addition, the target computer must be configured to accept a remote connection. The target computer credentials are sent to attempt to perform the authentication process. If authentication is successful, the user is connected to local and network resources that are accessible by using the supplied credentials.
Network logon
A network logon can only be used after user, service, or computer authentication has taken place. During network logon, the process does not use the credentials entry dialog boxes to collect data. Instead, previously established credentials or another method to collect credentials is used. This process confirms the user’s identity to any network service that the user is attempting to access. This process is typically invisible to the user unless alternate credentials have to be provided.
To provide this type of authentication, the security system includes these authentication mechanisms:
Kerberos version 5 protocol
Public key certificates
Secure Sockets Layer/Transport Layer Security (SSL/TLS)
NTLM, for compatibility with Microsoft Windows NT 4.0-based systems
For information about the elements and processes, see the interactive logon diagram above.
Smart card logon
Smart cards can be used to log on only to domain accounts, not local accounts. Smart card authentication requires the use of the Kerberos authentication protocol. Introduced in Windows 2000 Server, in Windows-based operating systems a public key extension to the Kerberos protocol’s initial authentication request is implemented. In contrast to shared secret key cryptography, public key cryptography is asymmetric, that is, two different keys are needed: one to encrypt, another to decrypt. Together, the keys that are required to perform both operations make up a private/public key pair.
To initiate a typical logon session, a user must prove his or her identity by providing information known only to the user and the underlying Kerberos protocol infrastructure. The secret information is a cryptographic shared key derived from the user’s password. A shared secret key is symmetric, which means that the same key is used for both encryption and decryption.
The following diagram shows the elements and processes required for smart card logon.
Smart Card credential provider architecture
When a smart card is used instead of a password, a private/public key pair stored on the user’s smart card is substituted for the shared secret key, which is derived from the user’s password. The private key is stored only on the smart card. The public key can be made available to anyone with whom the owner wants to exchange confidential information.
For more information about the smart card logon process in Windows, see How smart card sign-in works in Windows.
Biometric logon
A device is used to capture and build a digital characteristic of an artifact, such as a fingerprint. This digital representation is then compared to a sample of the same artifact, and when the two are successfully compared, authentication can occur. Computers running any of the operating systems designated in the Applies to list at the beginning of this topic can be configured to accept this form of logon. However, if biometric logon is only configured for local logon, the user needs to present domain credentials when accessing an Active Directory domain.
Additional resources
For information about how Windows manages credentials submitted during the logon process, see Credentials Management in Windows Authentication.
Windows Logon Process
Winlogon — компонент операционной системы Microsoft Windows, отвечающий за вход в систему. и т.д.
Содержание
Краткий обзор
Winlogon запускается процессом SMSS вместе с процессом CSRSS. Для реализации диалога с пользователем Winlogon применяет библиотеку GINA. Winlogon обрабатывает нажатие Ctrl-Alt-Del и Ctrl-Shift-Esc. winlogon.exe подгружает и выполняет код из библиотек Winlogon notification packages. Такие библиотеки применяются системой, программами и вирусами. Они не поддерживаются в Windows Vista (подробнее. Имя winlogon.exe используют некоторые вирусы — они находятся вне папки system32.
Критичность процесса Winlogon
Настоящий процесс Winlogon.exe через стандартное WinAPI невозможно закрыть. Для этого требуется привилегия SE_DEBUG
Если все-таки закрыть процесс Winlogon, на экране появится BSOD со следующим сообщением:
c000021a
В русской версии ОС экран заполнится крокозябрами.
Функции Winlogon
Процесс Winlogon начинает работу, будучи запущенным процессом SMSS. После некоторых подготовительных действий, Winlogon отображает приглашение ко входу в систему Windows. В ходе запуска ОС Winlogon запускает LSASS и Services.exe. Если активен новый стиль экрана приветствия, то для его отображения запускается процесс «logonui.exe». После входа в систему Winlogon запускает программы, прописанные в параметре Userinit — обычно «userinit.exe». Эта программа выполняет запуск программ, прописанных в параметре Shell — обычно «explorer.exe».
Winlogon и вредоносные программы
Вирусы и другие вредосные программы могут добавлять Winlogon notification packages и изменять параметры Shell и Userinit.
Компоненты Microsoft Windows
Aero • Desktop Window Manager • Проводник (Explorer) • Панель задач • Меню «Пуск» • Shell (namespace • Special Folders • File associations) • Search (Saved search • iFilters) • Graphics Device Interface • WIM • Next Generation TCP/IP stack () • .NET Framework • Audio • Printing (XML Paper Specification) • Active Scripting (WSH • VBScript • COM (OLE • OLE Automation • DCOM • ActiveX • ActiveX Document • Structured storage • Transaction Server) • Previous Versions • WDDM • UAA • Win32 console
Калькулятор • Calendar • Таблица символов • Contacts • DVD Maker • Fax and Scan • Internet Explorer • Journal • Outlook Express • Почта Windows • Magnifier • Media Center • Meeting Space • Mobile Device Center • Mobility Center • Movie Maker • Narrator • Notepad • Paint • Фотоальбом • Private Character Editor • Remote Assistance • Sidebar • Snipping Tool • Звукозапись • Windows Media Player • Windows Speech Recognition • Игры
Chess Titans • Hold ‘Em • InkBall • Mahjong Titans • Purble Place • Пасьянс «Косынка» • Пасьянс «Паук» • Сапёр • Пасьянс «Свободная ячейка» • Пинбол • Червы
Autorun • BITS • Task Scheduler • Wireless Zero Configuration • Shadow Copy • Windows Error Reporting • Multimedia Class Scheduler • CLFS
Hard link • Junction point • Mount Point • Reparse point • Symbolic link • TxF • FAT • CDFS • UDF • DFS • IFS
Domains • Active Directory • DNS • Групповая политика • Roaming user profiles • Folder redirection • Координатор распределённых транзакций • MSMQ • Windows SharePoint Services • Windows Media Services • Rights Management Services • IIS • Terminal Services • WSUS • Network Access Protection • DFS Replication • Remote Differential Compression • Print Services for UNIX • Remote Installation Services • Windows Deployment Services • Windows System Resource Manager • Hyper-V
NT series architecture • Object Manager • Startup process (Vista) • I/O request packets • Kernel Transaction Manager • Logical Disk Manager • Security Accounts Manager • Windows Resource Protection • LSASS • CSRSS • SMSS
Unix subsystem (Interix) • Virtual DOS Machine • Windows on Windows • WOW64
Wikimedia Foundation . 2010 .
Смотреть что такое «Windows Logon Process» в других словарях:
Windows startup process — The Windows Startup Process is the process by which Microsoft s Windows series of operating systems initializes. DOS based Windows In Windows 3.x and 95/98/ME, the boot loader phase is handled by MS DOS. During the boot phase, the Autoexec.bat… … Wikipedia
Windows NT Logon Application — Winlogon компонент операционной системы Microsoft Windows, отвечающий за вход в систему. и т.д. Содержание 1 Краткий обзор 2 Критичность процесса Winlogon 3 Функции Winlogon … Википедия
Windows Genuine Advantage — Developer(s) Microsoft Stable release 1.9.42.0 / June 26, 2009; 2 years ago (2009 06 26) … Wikipedia
Windows NT startup process — The Windows NT startup process is the process by which Windows NT 4.0, Windows 2000, Windows XP and Windows Server 2003 operating systems initialize. In Windows Vista and later, this process has changed slightly; see Windows Vista startup process … Wikipedia
Windows Server domain — A Windows Server domain is a logical group of computers running versions of the Microsoft Windows operating system that share a central directory database. This central database (known as Active Directory starting with Windows 2000Northrup, Tony … Wikipedia
Windows Registry — The Windows Registry is a hierarchical database that stores configuration settings and options on Microsoft Windows operating systems. It contains settings for low level operating system components as well as the applications running on the… … Wikipedia
Windows Product Activation — is an anti piracy measure created by Microsoft Corporation that enforces the Windows EULA (End User License Agreement) and/or other license agreements.If the Windows operating system is not activated within a limited period of time, it will… … Wikipedia
Windows 95 — Part of the Microsoft Windows family … Wikipedia
Windows 98 — Part of the Microsoft Windows family … Wikipedia
Windows Me — Part of the Microsoft Windows family … Wikipedia