Rutgers computer science has used Kerberos slightly for decades, but we’ve
never really taken advantage of its facilities. We have a number of challenges
that I think it can help us with, so we’re planning to move into a more
complete implementation, based on Redhat’s free ipa.
In the course
>Can you please assist me with the following question as I have read a
>lot of Kerberos documentation and still cannot find the answer to one
>question in any of the documents (unless I missed it).
>
>"How does a trusting Kerberos TGS get it's 'session key' to the
>requester in the trusted domain"
Hello
Can you please assist me with the following question as I have read a lot of
Kerberos documentation and still cannot find the answer to one question in any
of the documents (unless I missed it).
"How does a trusting Kerberos TGS get it's 'session key' to the requester in
the trusted