You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@directory.apache.org by er...@apache.org on 2004/12/02 12:13:39 UTC

svn commit: r109493 - /incubator/directory/kerberos/trunk/xdocs/index.xml

Author: erodriguez
Date: Thu Dec  2 03:13:37 2004
New Revision: 109493

URL: http://svn.apache.org/viewcvs?view=rev&rev=109493
Log:
Added link to nice chart.
Modified:
   incubator/directory/kerberos/trunk/xdocs/index.xml

Modified: incubator/directory/kerberos/trunk/xdocs/index.xml
Url: http://svn.apache.org/viewcvs/incubator/directory/kerberos/trunk/xdocs/index.xml?view=diff&rev=109493&p1=incubator/directory/kerberos/trunk/xdocs/index.xml&r1=109492&p2=incubator/directory/kerberos/trunk/xdocs/index.xml&r2=109493
==============================================================================
--- incubator/directory/kerberos/trunk/xdocs/index.xml	(original)
+++ incubator/directory/kerberos/trunk/xdocs/index.xml	Thu Dec  2 03:13:37 2004
@@ -8,7 +8,7 @@
     <body>
         <section name="Introduction">
             <p>Apache Kerberos is a Java implementation of the 
-        <a href="http://www.ietf.org/rfc/rfc1510.txt">RFC 1510</a> Kerberos V5 Network Authentication Service.  The purpose of Kerberos is to verify the identities of principals (users or services) on an unprotected network.  While generally thought of as a single-sign-on technology, Kerberos' true strength is in authenticating users without ever sending their password over the network.  Kerberos is designed for use on open (untrusted) networks and, therefore, operates under the assumption that packets traveling along the network can be read, modified, and inserted at will.</p>
+        <a href="http://www.ietf.org/rfc/rfc1510.txt">RFC 1510</a> Kerberos V5 Network Authentication Service.  The purpose of Kerberos is to verify the identities of principals (users or services) on an unprotected network.  While generally thought of as a single-sign-on technology, Kerberos' true strength is in authenticating users without ever sending their password over the network.  Kerberos is designed for use on open (untrusted) networks and, therefore, operates under the assumption that packets traveling along the network can be read, modified, and inserted at will.  <a href="http://www.computerworld.com/computerworld/records/images/pdf/kerberos_chart.pdf">This chart</a> provides a good description of the protocol workflow.</p>
 
             <p>Kerberos is named for the three-headed dog that guards the gates to Hades.  The three heads are the client, the Kerberos server, and the network service being accessed.</p>