kerberos — Introduction to the Kerberos Security System
Description
The Kerberos system authenticates individual users in a network environment. After authenticating yourself to Kerberos, you can use the kerberos authentication option of network services such as NFS. In addition, in some environments you can use network commands such as rlogin(1), rcp(1), and rsh(1) without having to present passwords to remote hosts and without needing entries in .rhosts files. See your system administrator for more information about Kerberos support at your site.
Before you can use Kerberos, you must be registered as a user in the Kerberos database. You can use the kinit(1) command to find out your status. This command tries to log you in to the Kerberos ...
Get Solaris™ 7 Reference now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.