Author: erodriguez Date: Thu Dec 2 03:13:37 2004 New Revision: 109493 URL: http://svn.apache.org/viewcvs?view=rev&rev=109493 Log: Added link to nice chart. Modified: incubator/directory/kerberos/trunk/xdocs/index.xml
Modified: incubator/directory/kerberos/trunk/xdocs/index.xml Url: http://svn.apache.org/viewcvs/incubator/directory/kerberos/trunk/xdocs/index.xml?view=diff&rev=109493&p1=incubator/directory/kerberos/trunk/xdocs/index.xml&r1=109492&p2=incubator/directory/kerberos/trunk/xdocs/index.xml&r2=109493 ============================================================================== --- incubator/directory/kerberos/trunk/xdocs/index.xml (original) +++ incubator/directory/kerberos/trunk/xdocs/index.xml Thu Dec 2 03:13:37 2004 @@ -8,7 +8,7 @@ <body> <section name="Introduction"> <p>Apache Kerberos is a Java implementation of the - <a href="http://www.ietf.org/rfc/rfc1510.txt">RFC 1510</a> Kerberos V5 Network Authentication Service. The purpose of Kerberos is to verify the identities of principals (users or services) on an unprotected network. While generally thought of as a single-sign-on technology, Kerberos' true strength is in authenticating users without ever sending their password over the network. Kerberos is designed for use on open (untrusted) networks and, therefore, operates under the assumption that packets traveling along the network can be read, modified, and inserted at will.</p> + <a href="http://www.ietf.org/rfc/rfc1510.txt">RFC 1510</a> Kerberos V5 Network Authentication Service. The purpose of Kerberos is to verify the identities of principals (users or services) on an unprotected network. While generally thought of as a single-sign-on technology, Kerberos' true strength is in authenticating users without ever sending their password over the network. Kerberos is designed for use on open (untrusted) networks and, therefore, operates under the assumption that packets traveling along the network can be read, modified, and inserted at will. <a href="http://www.computerworld.com/computerworld/records/images/pdf/kerberos_chart.pdf">This chart</a> provides a good description of the protocol workflow.</p> <p>Kerberos is named for the three-headed dog that guards the gates to Hades. The three heads are the client, the Kerberos server, and the network service being accessed.</p>
