client/server architecture supports the
Kerberos
Password
Public key
HP supports
Kerberos
IPv6
Trusted Systems
TCP Wrappers
PAM (PAM_UNIX, PAM_Kerberos, PAM_LDAP)
Compatibility/Interoperability
Because of its widespread acceptance and implementation in other operating systems, including Windows 2000 ®, Windows 2003, Solaris, and Linux, the Kerberos authentication protocol can interoperate in a heterogeneous environment allowing users on machines running one operating system to securely authenticate themselves on hosts of a different operating system.
Summary
Adding Kerberos to a network can increase the overall security available to the users and administrators of that network. Remote sessions can be securely authenticated and encrypted. In addition, Kerberos allows the user and service principal’s database to be managed securely from any machine that supports the Kerberos protocol. All
References
This section includes the URLs that customers can use if they would like to learn more about Kerberos and URLs that link to information about support, services, and accessibility.
1.Kerberos Manuals on the HP documentation website: http://www.docs.hp.com/hpux/internet/index.html#Kerberos
2.The ITRC Website at http://itrc.hp.com where there is a wealth of information available for all HP- UX products, regarding maintenance, support, training and education.