When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Kerberos (protocol) - Wikipedia

    en.wikipedia.org/wiki/Kerberos_(protocol)

    In contrast, when either client or server or both are not joined to a domain (or not part of the same trusted domain environment), Windows will instead use NTLM for authentication between client and server. [13] Internet web applications can enforce Kerberos as an authentication method for domain-joined clients by using APIs provided under SSPI.

  3. List of single sign-on implementations - Wikipedia

    en.wikipedia.org/wiki/List_of_single_sign-on...

    Works with Kerberos (e.g. Active Directory) and other authentication mechanisms to map different identities and hence allow single signon to all IBM server platforms (Windows, Linux, PowerLinux, IBM i, i5/OS, OS/400, AIX) even when the user name differs.

  4. Domain controller - Wikipedia

    en.wikipedia.org/wiki/Domain_controller

    The software and operating system used to run a domain controller usually consists of several key components shared across platforms.This includes the operating system (usually Windows Server or Linux), an LDAP service (Red Hat Directory Server, etc.), a network time service (ntpd, chrony, etc.), and a computer network authentication protocol (usually Kerberos). [4]

  5. FreeIPA - Wikipedia

    en.wikipedia.org/wiki/FreeIPA

    It uses a combination of Fedora Linux, 389 Directory Server, MIT Kerberos, NTP, DNS, the Dogtag certificate system, SSSD and other free/open-source components. FreeIPA includes extensible management interfaces (CLI, Web UI, XMLRPC and JSONRPC API) and Python SDK for the integrated CA, and BIND with a custom plugin for the integrated DNS server ...

  6. Apple Open Directory - Wikipedia

    en.wikipedia.org/wiki/Apple_Open_Directory

    Either provides an authentication model and stores password information outside of the directory domain itself. [3] For Kerberos authentication, the Kerberos realm can either be hosted by a Kerberos key distribution center (KDC) running on the server system, or the server can participate in an existing Kerberos realm.

  7. Authentication server - Wikipedia

    en.wikipedia.org/wiki/Authentication_server

    An authentication server provides a network service that applications use to authenticate the credentials, [1] usually account names and passwords, of their users. When a client submits a valid set of credentials, it receives a cryptographic ticket that it can subsequently use to access various services.

  8. Comparison of OLAP servers - Wikipedia

    en.wikipedia.org/wiki/Comparison_of_OLAP_servers

    Essbase authentication, LDAP authentication, Microsoft Active Directory: SSL: Yes Yes Yes No IBM Cognos TM1: Builtin, LDAP, Microsoft Active Directory, NTLM, IBM Cognos BI authentication SSL: Yes Yes Yes Yes icCube HTTP Basic/Form Authentication, Windows SSO (NTLM, Kerberos), Plugin Based for Embedded Usage SSL: Yes Yes Yes Yes Jedox OLAP Server

  9. Windows Services for UNIX - Wikipedia

    en.wikipedia.org/wiki/Windows_Services_for_UNIX

    Network authentication for UNIX systems relies on the insecure NIS protocol (LDAP- and Kerberos-based authentication require a third-party solution). Microsoft has released several hotfixes for Windows Services for UNIX, and at least one Security Update (KB939778).