Table of Contents

Search

  1. Preface
  2. Introduction to MDM Hub Security
  3. Resources
  4. Roles
  5. Users and User Groups
  6. Security Providers
  7. Application Level Security
  8. Certificate-Based Authentication
  9. Password Hashing
  10. Appendix A: Glossary

Kerberos

Kerberos

Computer network authentication protocol that allows nodes that communicate over a non-secure network to prove their identity to one another in a secure manner. The Massachusetts Institute of Technology developed the protocol and makes an implementation of Kerberos freely available.

0 COMMENTS

We’d like to hear from you!