Back to index

Third Party Authentication in the Institutional File System

Bill Doster and Jim Rees

One-line summary: Indirect authentication using Kerberos, but with the twist that the client is used as a service by the "proxy" device.

Overview/Main Points

Relevance

Of high relevance as a comparison to Charon.

Flaws


Back to index