Chapter 6 Setting Up Kerberos/SSH Connections
Table of Contents In addition to the authentication methods described in Chapter 3, you can use Kerberos, the network authentication protocol from the Massachusetts Institute of Technology. This chapter describes how to set up and use Kerberos on SSH. Before you can use Kerberos authentication, you must set up Kerberos on OpenVMS, as described in the OpenVMS HP Open Source Security for OpenVMS Volume 3: Kerberos manual.
This chapter describes how to set up Kerberos authentication, including the following topics: |