First page Back Continue Last page Overview Graphics
What this talk is about
A high-level view of how Kerberos works
How Kerberos differs from some other authentication systems
- SSH password auth, SSH public key auth, SSL
Target audience:
- LSPs, computing staff, others?