Windows Server 2003 Security Infrastructures: Core Security Features (HP Technologies)

Let us now revisit the Passport authentication exchange of Figure 7.4 and look at which cookies are sent back and forth between the different Passport components. This exchange is illustrated in Figure 7.7.

An important component in the Passport authentication cookie exchanges is the Passport Manager COM object. It is a server-side automation object that is installed on all participating Web sites. The Passport Manager object provides encryption services to protect Passport user data and handles the Passport cookie setting, parsing, and expiration logic. It also silently communicates with the Passport Nexus servers to determine the current configuration of the Passport network. Besides cookies, it also uses the HTTP query string as an intermediary for querying the central user store at the Passport domain authority. The advantage of using cookies over the HTTP query string as a data storage intermediary is that the URL display in the user’s browser (the Internet Explorer “Address Bar”) does not become cluttered with cryptic information:

Figure 7.7: Passport authentication sequence including cookies: initial login (Windows XP and Windows Server 2003).

Note the different cookies that are stored in the user’s cookie store on the user’s machine. In Windows XP and Windows Server 2003, user-specific cookies are stored in the “cookies” folder of the user profile.

Figure 7.8 shows the Passport cookies that are exchanged when the user accesses another Web site (in the example “Starbucks.com” during the user’s Passport logon session0. In this case the Passport Authentication Sequence will be slightly shorter:

Figure 7.8: Passport authentication sequence including cookies: log in to second site (Windows XP and Windows Server 2003).

“Sign In” icon on the Starbucks homepage.

Passport domain authority server’s login page.

Категории