[2012] in Kerberos
What types of applications have been Kerberized?
daemon@ATHENA.MIT.EDU (Jim Barnes)
Tue Jun 30 00:41:17 1992
Date: 29 Jun 92 19:31:49 GMT
From: barnes@xylogics.com (Jim Barnes)
To: kerberos@shelby.Stanford.EDU
Does a typical Kerberos implementation just provide authentication
for network access or does the typical situation also include
kerberized versions of rlogin and telnet? Are there other applications
that have been Kerberized?
Jim Barnes (barnes@xylogics.com)
--
--
Jim Barnes (barnes@Xylogics.COM)