Deprecated commands such as telnet can require weak encryption keys. These keys are not allowed by default in the krb5.conf file. For more information, see Supported Encryption Types in Kerberos and the krb5.conf(4) man page.
For more information, see Controlling Access to Machine Resources in Securing Systems and Attached Devices in Oracle Solaris 11.2 . See also the man pages that are listed in Kerberos User Commands.
The Kerberos-based (“Kerberized”) commands available to users are the following:
rcp, rlogin, rsh
ssh, scp, sftp
These applications are the same as the Oracle Solaris application of the same name. However, they have been extended to use Kerberos principals to authenticate transactions, thereby providing Kerberos-based security. For information about principals, see Kerberos Principals.
These commands are discussed further in Kerberos User Commands.