HP Open Source Security for OpenVMS Volume 3: Kerberos > Preface

Intended Audience

 » Table of Contents

 » Glossary

 » Index

This document is for application developers who want to implement the Kerberos protocol that uses strong cryptography, so that a client can prove its identity to a server (and vice versa) across an insecure network connection.