3
<title>Kerberos V5 UNIX User's Guide</title>
4
<meta http-equiv="Content-Type" content="text/html">
5
<meta name="description" content="Kerberos V5 UNIX User's Guide">
6
<meta name="generator" content="makeinfo 4.5">
7
<link href="http://www.gnu.org/software/texinfo/" rel="generator-home">
12
Node:<a name="Kerberos%20V5%20Applications">Kerberos V5 Applications</a>,
13
Previous:<a rel="previous" accesskey="p" href="Password-Management.html#Password%20Management">Password Management</a>,
14
Up:<a rel="up" accesskey="u" href="Kerberos-V5-Tutorial.html#Kerberos%20V5%20Tutorial">Kerberos V5 Tutorial</a>
18
<h3 class="section">Kerberos V5 Applications</h3>
20
Kerberos V5 is a <dfn>single-sign-on</dfn> system. This means that you
21
only have to type your password once, and the Kerberos V5 programs
22
do the authenticating (and optionally encrypting) for you. The way this
23
works is that Kerberos has been built into each of a suite of network
24
programs. For example, when you use a Kerberos V5 program to
25
connect to a remote host, the program, the KDC, and the remote host
26
perform a set of rapid negotiations. When these negotiations are
27
completed, your program has proven your identity on your behalf to the
28
remote host, and the remote host has granted you access, all in the
29
space of a few seconds.
31
<p>The Kerberos V5 applications are versions of existing UNIX network
32
programs with the Kerberos features added.
35
<li><a accesskey="1" href="Overview-of-Additional-Features.html#Overview%20of%20Additional%20Features">Overview of Additional Features</a>:
36
<li><a accesskey="2" href="telnet.html#telnet">telnet</a>:
37
<li><a accesskey="3" href="rlogin.html#rlogin">rlogin</a>:
38
<li><a accesskey="4" href="FTP.html#FTP">FTP</a>:
39
<li><a accesskey="5" href="rsh.html#rsh">rsh</a>:
40
<li><a accesskey="6" href="rcp.html#rcp">rcp</a>:
41
<li><a accesskey="7" href="ksu.html#ksu">ksu</a>: