PC Authentication (Windows CE 5.0)
The PC Authentication Catalog item provides a Windows CE Local Authentication Plugin (LAP) that performs user authentication by determining if a computer running Windows is locked or unlocked. It does this by using the network to query an application, also provided by this Catalog item, that runs on that specific computer.
The Telephony User Interface (TUI) uses this LAP and PC application to avoid requiring user input when the computer is unlocked and a phone user asks for confidential information. For more information about how the TUI uses this Catalog item, see Limiting Access to Sensitive Information in the TUI.
For more information about LAPs and the Windows CE Local Authentication Subsystem (LASS), see Local Authentication Subsystem (LASS).
In This Section
- PC Authentication OS Design Development
Provides information that is helpful when designing and developing a Windows CE OS design that uses the PC Authentication Catalog item. This includes dependencies of PC Authentication, the modules and components that implement PC Authentication, and PC Authentication SYSGEN variables. - PC Authentication Application Development
Explains how to write code that uses PC Authentication. - PC Authentication Registry Settings
Provides information about the configurable registry settings used by PC Authentication. - PC Authentication Security
Provides security best practice information relevant to PC Authentication. - PC Authentication Migration
Provides information that is useful if you are migrating from an OS design that includes the PC Authentication Catalog item and is based on a previous version of Windows CE. - PC Authentication Samples
Describes sample code that uses or relates to the PC Authentication Catalog item. - PC Authentication Reference
Provides reference information for the API provided by the PC Authentication Catalog item.
Related Sections
- Telephony User Interface (TUI)
Explains the TUI application, which uses the PC Authentication Catalog item to protect against unauthorized access to private contact information. - Local Authentication Subsystem (LASS)
Explains how the LASS operates and how it uses LAPs.
Send Feedback on this topic to the authors