This is a network authentication protocol widely used in the enterprise environments. This server issues a special token or ticket to be authenticated and it uses this ticket to validate user access to a resource or a service.

What will be an ideal response?

Kerberos

Computer Science & Information Technology

You might also like to view...

Your entire house can be protected from surges and spikes by installing a surge protector at the house ________ panel

Fill in the blank(s) with correct word

Computer Science & Information Technology

Building an application in a _____ environment can offer greater benefits, and sometimes greater risks, when compared to a traditional environment.

A. GUI B. web-based C. cloud D. multinational

Computer Science & Information Technology