Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
146377 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.109231
Categoría:Policy
Título:Microsoft Windows: Network security: Allow PKU2U authentication requests to this computer to use online identities
Resumen:Starting with Windows Server 2008 R2 and Windows 7, the;Negotiate Security Support Provider (SSP) supports an extension SSP, Negoexts.dll. This extension;SSP is treated as an authentication protocol by the Windows operating system, and it supports SSPs;from Microsoft, including PKU2U. You can also develop or add other SSPs.;;When devices are configured to accept authentication requests by using online IDs, Negoexts.dll;calls the PKU2U SSP on the computer that is used to log on. The PKU2U SSP obtains a local;certificate and exchanges the policy between the peer computers. When validated on the peer computer,;the certificate within the metadata is sent to the logon peer for validation. It associates the;user's certificate to a security token, and then the logon process completes.;;(C) Microsoft Corporation 2015.
Descripción:Summary:
Starting with Windows Server 2008 R2 and Windows 7, the
Negotiate Security Support Provider (SSP) supports an extension SSP, Negoexts.dll. This extension
SSP is treated as an authentication protocol by the Windows operating system, and it supports SSPs
from Microsoft, including PKU2U. You can also develop or add other SSPs.

When devices are configured to accept authentication requests by using online IDs, Negoexts.dll
calls the PKU2U SSP on the computer that is used to log on. The PKU2U SSP obtains a local
certificate and exchanges the policy between the peer computers. When validated on the peer computer,
the certificate within the metadata is sent to the logon peer for validation. It associates the
user's certificate to a security token, and then the logon process completes.

(C) Microsoft Corporation 2015.

CVSS Score:
0.0

CVSS Vector:
AV:L/AC:H/Au:S/C:N/I:N/A:N

CopyrightCopyright (C) 2018 Greenbone AG

Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.