PC Authentication Security (Windows CE 5.0)

Send Feedback

The PC Authentication Catalog item is designed to use a network. To mitigate potential security risks, use available network security resources.

For information about how the connection between a desktop computer and a Windows CE-based device is authenticated and encrypted, see PC Authentication Architecture.

Note   Desktop computers that use IPsec can cause the communication between the desktop computer application and the LAP to operate differently. For more information, see PC Authentication and IPsec.

Best Practices

When using the PC Authentication Catalog item, remember the following best practices:

Consider LASS Security Content

PC Authentication uses the Local Security Subsystem (LASS). For more information about LASS security concerns, see LASS Security.

Keep existing security measures if you modify code

The provided PC Authentication implementation helps to secure communication between the Windows CE-based device and the desktop computer by using mutual authentication and Kerberos encryption. If you modify the provided source code, ensure that your modifications do not compromise the security provided by the existing code.

Default Registry Settings

You should be aware of the registry settings that impact security. If a value has security implications, you will find a Security Note in the registry settings documentation.

For registry information, see PC Authentication Registry Settings.

See Also

PC Authentication | Enhancing the Security of a Device

Send Feedback on this topic to the authors

Feedback FAQs

© 2006 Microsoft Corporation. All rights reserved.