
48 Securing NFS in AIX
IBM offers several forms of encryption with its Kerberos V5 implementation,
among which are single DES and triple DES.
3.1.6 Looking ahead to the rest of the chapter
The rest of this chapter compares different options for identification,
authentication, and authorization, which are different for hosts and users. We
discuss users first, and then hosts.
We use various Kerberos-related terms throughout this chapter. See Appendix A,
“Kerberos” on page 243 for a description of Kerberos and its related terms.
3.2 NFS V4 user/group identification
In this section, we discuss three different methods for managing user and group
identiti ...