Many organizations rely upon Active Directory (AD) for user management. AD allows for security profiles to be assigned to groups, and for people to be added to such groups. AD is a critical component of many environments, making the security of AD a top priority.

AD works with two secure protocols for authentication:



Compare and contrast the two protocols in a 1 page APA paper. Discuss how and why each is used, then discuss how they are similar and how they differ.