I created a presentation PDF a while back that I've placed on the Web
which goes into detail on Kerberos enctypes in terms of how they are
used, negotiated and controlled via *.conf parameters.  It can be
downloaded via my blog:

http://blogs.sun.com/roller/page/wfiveash?entry=everything_you_wanted_to_know

Hope it helps (and let me know if there are any problems with the
presentation),
-- 
Will Fiveash
Sun Microsystems Inc.
Austin, TX, USA (TZ=CST6CDT)
________________________________________________
Kerberos mailing list           [email protected]
https://mailman.mit.edu/mailman/listinfo/kerberos

Reply via email to