Chapter 1-1-1

One of the most difficult steps in access control administration involves the authentication of users to ensure that they are who they claim to be. In Chapter 1-3-2, “Implementing Kerberos in Distributed Systems,” the use of Kerberos — the de facto standard for authentication in large, heterogeneous network environments — is described ... ................
................