I created a presentation PDF a while back that I've placed on the Web which goes into detail on Kerberos enctypes in terms of how they are used, negotiated and controlled via *.conf parameters. It can be downloaded via my blog:
http://blogs.sun.com/roller/page/wfiveash?entry=everything_you_wanted_to_know Hope it helps (and let me know if there are any problems with the presentation), -- Will Fiveash Sun Microsystems Inc. Austin, TX, USA (TZ=CST6CDT) ________________________________________________ Kerberos mailing list [email protected] https://mailman.mit.edu/mailman/listinfo/kerberos
