Kerberos
#1

In a non-networked personal computing environment resources and information can be protected by physically securing the personal computer. But in a network of users requiring services from many computers the identity of each user has to be accurately verified. For authentication kerberos is being used. Kerberos is a third party authentication technology used to identify a user requesting a service.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: kerberos and ldap, kerberos best practices, comparative study of two mobile brandstication and kerberos, kerberos tray, kerberos overview, kerberos name, kerberos v5 authentication,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
Kerberos - by computer science crazy - 22-09-2008, 09:33 AM

Possibly Related Threads...
Thread Author Replies Views Last Post
  Kerberos computer science crazy 3 2,997 27-08-2011, 09:38 AM
Last Post: devendershekhawat
  Kerberos iitbuji 1 2,388 13-02-2010, 04:31 PM
Last Post: project report tiger

Forum Jump: