Kerberos - Application

> Software Security > (Authentication|Access control|Identification) - AuthN > Kerberos

1 - About

kerberos application that uses the kerberos protocol.

Advertising

3 - Example

When jennifer used telnet to connect to the host daffodil.mit.edu, the telnet program presented her ticket-granting ticket to the KDC and requested a host ticket for the host daffodil.mit.edu. The KDC sent the host ticket, which telnet then presented to the host daffodil.mit.edu, and she was allowed to log in without typing her password.

4 - Documentation / Reference