

Kerberos › About Kerberos › Authentication of Principals
Authentication of Principals
Kerberos for z/OS verifies requests as a trusted third party authentication service. Using conventional shared key cryptography, Kerberos confirms the identities of principals (users):
- Without relying on authentication by the host operating system
- Without basing trust on host addresses
- Without necessitating physical security of all hosts on the network
- Under the premise that packets traveling along the network can be read, changed, and inserted at will
Copyright © 2014 CA Technologies.
All rights reserved.
 
|
|