Interoperability With Windows 2000
Understanding the Terminology
In broad strokes, that is how the Kerberos authentication protocol works and both implementations under discussion have virtually identical conceptual frameworks. Of course there are mechanical differences
The next section, “Table of Analogous Terms” on page 54 lists the difference in the terminologies used.
Chapter 4 | 53 |