On Thu, Jun 30, 2005 at 06:25:08PM -0500, Will Fiveash wrote:
> On Thu, Jun 30, 2005 at 05:21:40PM -0400, Ken Hornstein wrote:
> > >I created a presentation PDF a while back that I've placed on the Web
> > >which goes into detail on Kerberos enctypes in terms of how they are
> > >used, negotiated a
On Thu, Jun 30, 2005 at 05:21:40PM -0400, Ken Hornstein wrote:
> >I created a presentation PDF a while back that I've placed on the Web
> >which goes into detail on Kerberos enctypes in terms of how they are
> >used, negotiated and controlled via *.conf parameters. It can be
> >downloaded via my b
>I created a presentation PDF a while back that I've placed on the Web
>which goes into detail on Kerberos enctypes in terms of how they are
>used, negotiated and controlled via *.conf parameters. It can be
>downloaded via my blog:
>
>http://blogs.sun.com/roller/page/wfiveash?entry=everything_you_
I created a presentation PDF a while back that I've placed on the Web
which goes into detail on Kerberos enctypes in terms of how they are
used, negotiated and controlled via *.conf parameters. It can be
downloaded via my blog:
http://blogs.sun.com/roller/page/wfiveash?entry=everything_you_wanted