Author: erodriguez
Date: Thu Dec  2 03:13:37 2004
New Revision: 109493

URL: http://svn.apache.org/viewcvs?view=rev&rev=109493
Log:
Added link to nice chart.
Modified:
   incubator/directory/kerberos/trunk/xdocs/index.xml

Modified: incubator/directory/kerberos/trunk/xdocs/index.xml
Url: 
http://svn.apache.org/viewcvs/incubator/directory/kerberos/trunk/xdocs/index.xml?view=diff&rev=109493&p1=incubator/directory/kerberos/trunk/xdocs/index.xml&r1=109492&p2=incubator/directory/kerberos/trunk/xdocs/index.xml&r2=109493
==============================================================================
--- incubator/directory/kerberos/trunk/xdocs/index.xml  (original)
+++ incubator/directory/kerberos/trunk/xdocs/index.xml  Thu Dec  2 03:13:37 2004
@@ -8,7 +8,7 @@
     <body>
         <section name="Introduction">
             <p>Apache Kerberos is a Java implementation of the 
-        <a href="http://www.ietf.org/rfc/rfc1510.txt";>RFC 1510</a> Kerberos V5 
Network Authentication Service.  The purpose of Kerberos is to verify the 
identities of principals (users or services) on an unprotected network.  While 
generally thought of as a single-sign-on technology, Kerberos' true strength is 
in authenticating users without ever sending their password over the network.  
Kerberos is designed for use on open (untrusted) networks and, therefore, 
operates under the assumption that packets traveling along the network can be 
read, modified, and inserted at will.</p>
+        <a href="http://www.ietf.org/rfc/rfc1510.txt";>RFC 1510</a> Kerberos V5 
Network Authentication Service.  The purpose of Kerberos is to verify the 
identities of principals (users or services) on an unprotected network.  While 
generally thought of as a single-sign-on technology, Kerberos' true strength is 
in authenticating users without ever sending their password over the network.  
Kerberos is designed for use on open (untrusted) networks and, therefore, 
operates under the assumption that packets traveling along the network can be 
read, modified, and inserted at will.  <a 
href="http://www.computerworld.com/computerworld/records/images/pdf/kerberos_chart.pdf";>This
 chart</a> provides a good description of the protocol workflow.</p>
 
             <p>Kerberos is named for the three-headed dog that guards the 
gates to Hades.  The three heads are the client, the Kerberos server, and the 
network service being accessed.</p>
 

Reply via email to