Kerberos - Application

> Software Security > (Authentication|Access control|Identification) - AuthN > Kerberos

1 - About

kerberos application that uses the kerberos protocol.


3 - Example

When jennifer used telnet to connect to the host, the telnet program presented her ticket-granting ticket to the KDC and requested a host ticket for the host The KDC sent the host ticket, which telnet then presented to the host, and she was allowed to log in without typing her password.

4 - Documentation / Reference