[2012] in Kerberos

home help back first fref pref prev next nref lref last post

What types of applications have been Kerberized?

daemon@ATHENA.MIT.EDU (Jim Barnes)
Tue Jun 30 00:41:17 1992

Date: 29 Jun 92 19:31:49 GMT
From: barnes@xylogics.com (Jim Barnes)
To: kerberos@shelby.Stanford.EDU

Does a typical Kerberos implementation just provide authentication
for network access or does the typical situation also include
kerberized versions of rlogin and telnet?  Are there other applications
that have been Kerberized?

  Jim Barnes (barnes@xylogics.com)

-- 
 --
  Jim Barnes               (barnes@Xylogics.COM)  

home help back first fref pref prev next nref lref last post