|
End User's Perspective
Much of the DCE security mechanism occurs without the knowledge of users; for example, secure communications take place without the user's intervention. There are several ways,
however, in which users do come in contact with DCE security. One instance is when users type in their passwords to authenticate themselves to DCE, usually at login time. Another case is when they
change access to resources they own, using the dcecp. Finally, a user notices the security service in action when he or she is denied unauthorized access to resources.
|