Back to index

Third Party Authentication in the Institutional File System

Bill Doster and Jim Rees

One-line summary: Indirect authentication using Kerberos, but with the twist that the client is used as a service by the "proxy" device.

Overview/Main Points


Of high relevance as a comparison to Charon.


Back to index