4. Kerberos-based AAIs 1/3
The original Kerberos authentication system does not address authorization (i.e., authorization is left to the server)
Consequently, some AAIs have been developed
- that make use of the Kerberos system for authentication and
- that extend the basic Kerberos model with regard to authori-zation (resulting in Kerberos-based AAIs)
Exemplary Kerberos-based AAIs:
- A Secure European System for Applications in a Multi-vendor Environment (SESAME) developed by Bull, ICL, and SSE
- Distributed Computing Environment (DCE) promoted by the Open Group (formerly known as OSF)
- Microsoft Windows 2000
- ...