Simo, thanks for this detailed explanation. I think my general
understanding of the protocols was accurate (although I may have not
portrayed that earlier) and now I have a better understanding overall.
Thanks again,
Joshua Schaeffer
On Mon, Mar 27, 2017 at 10:05 AM, Simo Sorce wrote:
> On Wed,
On Wed, 2017-03-22 at 08:59 -0600, Joshua Schaeffer wrote:
> Again, I'm not an expert on any of these protocols, implementations,
> or frameworks so I'd be interested if anybody sees incorrect
> statements in my understanding. As far as your question about the
> proxy environment, I'm in the dark,
On Wed, 2017-03-22 at 11:23 +1300, chen dong wrote:
> I am not sure that my statement is right here. If I am wrong, please
> correct me.
>
> As Kerberos protocol works atop of TCP protocol. Kerberos protocol has its
> own different implementation such MIT Kerberos. And on top of Kerberos,
> there
On Tue, Mar 21, 2017 at 4:23 PM, chen dong wrote:
> I am not sure that my statement is right here. If I am wrong, please
> correct me.
>
> As Kerberos protocol works atop of TCP protocol. Kerberos protocol has its
> own different implementation such MIT Kerberos. And on top of Kerberos,
> there i
I am not sure that my statement is right here. If I am wrong, please
correct me.
As Kerberos protocol works atop of TCP protocol. Kerberos protocol has its
own different implementation such MIT Kerberos. And on top of Kerberos,
there is a virtual layer SASL - simple authentication and security lay