A computer receives a user authentication request from a client. The
computer accesses a password associated with the user name, stored
locally on the computer, and attempts to authenticate the password using
an authentication server. If the password authentication succeeds, the
computer hashes the password and compares the hashes. If the hashes
match, the user authentication succeeds.