HP (Hewlett-Packard) E0905 Server User Manual


 
Overview
Authentication Process
Chapter 128
Figure 1-1 illustrates the actions of the components and the Kerberos
protocol in a secured environment.
Figure 1-1 Authentication Process
The following is a description of how a client and server authenticate
each other using Kerberos:
Step 1. You can begin to use a Kerberos-secured application by entering your
principal name and password. Optionally, you can request specific ticket
flags and specify the key type to be used to construct the secret key. You
can also accept the default values configured for the client.
You can send the following information to the Authentication Service
(AS) to obtain credentials: