sponsored by PistolStar, Inc.
Posted:  17 Apr 2008
Published:  01 Apr 2008
Format:  PDF
Length:  8  Page(s)
Type:  White Paper
Language:  English
This paper will discuss the workings and benefits of Kerberos, focusing on its single sign-on capabilities, its multipronged security, and its ease of use.

Kerberos is a computer network authentication protocol that allows end-users in client-server environments to identify themselves more securely. Most notably, Kerberos allows end-users to reduce the number of passwords they possess and the number of logon attempts they need to make to just one. It also encrypts the end-users' identity so it is not openly sent over the network. Organizations find that Kerberos is a highly secure authentication method that delivers huge benefits for both end-users and administrators, and it contributes to improving their overall security.

Kerberos has become the most popular cross-platform, network-wide authentication system available, as it is now deeply integrated with Microsoft Windows and Active Directory. As a leading provider of password management products integrating Active Directory, PistolStar has developed a Kerberos-based solution using Active Directory as an option for customers who want a server-side product that enables them to execute single sign-on to gain access to all their Lotus Domino servers. The Password Power Plug-In for Domino SSO via Kerberos combines all the benefits of Kerberos authentication with the convenience and ease of use typically found in Password Power.

Active Directory | Authentication | Domino | Kerberos | Lotus Notes | Password Authentication Protocol | Password Management | Password Management Software

View All Resources sponsored by PistolStar, Inc.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement