Overview
Authentication Process
| Figure |
| protocol in a secured environment. |
Figure | Authentication Process |
The following is a description of how a client and server authenticate each other using Kerberos:
Step 1. You can begin to use a
You can send the following information to the Authentication Service (AS) to obtain credentials:
28 | Chapter 1 |