AZ- How does someone in my department get access to files on someone else's computer in another department?
AZ- How does the authentication mechanism get chosen?
AZ- Are other types of authentication allowed besides Kerberos?
AZ- How does the Windows authentication mechanism work? And how does Windows authorization work?
Charger plus de questions