This is a network authentication protocol widely used in the enterprise environments. This server issues a special token or ticket to be authenticated and it uses this ticket to validate user access to a resource or a service.
What will be an ideal response?
Kerberos
Computer Science & Information Technology
You might also like to view...
Your entire house can be protected from surges and spikes by installing a surge protector at the house ________ panel
Fill in the blank(s) with correct word
Computer Science & Information Technology
Building an application in a _____ environment can offer greater benefits, and sometimes greater risks, when compared to a traditional environment.
A. GUI B. web-based C. cloud D. multinational
Computer Science & Information Technology