In this video, we follow on from our previous Kerberos Overview and look at Kerberos Authentication in more detail. We examine the messages passed between components and how the different encryption keys we reviewed last time get used in practice. We look at both the initial authentication of the user and how the user then authenticates to a service.
SUBSCRIBE TO THE SAS SOFTWARE YOUTUBE CHANNEL
[ Ссылка ]
ABOUT SAS
SAS is a trusted analytics powerhouse for organizations seeking immediate value from their data. A deep bench of analytics solutions and broad industry knowledge keep our customers coming back and feeling confident. With SAS®, you can discover insights from your data and make sense of it all. Identify what’s working and fix what isn’t. Make more intelligent decisions. And drive relevant change. #SASSoftware
CONNECT WITH SAS
SAS ► [ Ссылка ]
SAS Customer Support ► [ Ссылка ]
SAS Communities ► [ Ссылка ]
SAS Analytics Explorers ► [ Ссылка ]
Facebook ► [ Ссылка ]
Twitter ► [ Ссылка ]
LinkedIn ► [ Ссылка ]
Blogs ► [ Ссылка ]
RSS ► [ Ссылка ]
![](https://s2.save4k.ru/pic/tl_Kl_yyHpE/maxresdefault.jpg)