skip book previous and next navigation links
go up to top of book: HP Open Source Security for OpenVMS Volume 3:... HP Open Source Security for OpenVMS Volume 3:...
go to beginning of preface: Preface Preface
 
go to next page: Document StructureDocument Structure
end of book navigation links

Intended Audience 



This document is for application developers who want to implement the Kerberos protocol that uses strong cryptography, so that a client can prove its identity to a server (and vice versa) across an insecure network connection.
 
go to next page: Document StructureDocument Structure