Chapter 4. Implementation
The
previous chapters discussed the concepts and theory that form the
basis of the Kerberos authentication system. Now, armed with a solid
background, we're ready to tackle the actual
implementation of a Kerberos authentication system from start to
finish. This chapter prepares you to install the Kerberos KDCs in
your network and also the Kerberos libraries on servers and client
machines. We will continue the process in Chapter 7 by detailing installation processes for
Kerberized application software.
|