Kerberos Authentication
Use the Kerberos Authentication page to configure the device
Authentication consists of two interdependent parts. First, the device verifies the user's credentials with the KDC. After the device user has supplied valid credentials and has been authenticated, the device searches for the user's
Use the Kerberos Authentication page to set up the parameters that are used to access the LDAP server and searches for the user's information. Note that this page only applies when Kerberos Version 5 is selected as a Log In Method on the Authentication Manager page.
The following illustration, table, and procedures describe how to use this screen.
Settings
Figure 3-11 Kerberos Authentication screen
ENWW | Kerberos Authentication 45 |