Managing Kerberos and Other Authentication Services in Oracle® Solaris 11.2

Exit Print View

Updated: August 2014
 
 

Kerberos User Commands

The Kerberos V5 product is a single sign-on system, which means that you only have to type your password only once when using network applications. The Kerberos V5 applications perform authentication and optionally encryption for you because Kerberos has been built into each of a suite of existing, familiar network applications. The Kerberos V5 applications are versions of existing UNIX network applications with Kerberos features added.


Note -  In general, the ssh application should suffice for your remote login needs. See the ssh(1) man page. For information about enabling a deprecated network application, see Kerberos Network Programs.

When you use a Kerberized application to connect to a remote system, the application, the KDC, and the remote system perform a set of rapid negotiations. When these negotiations are completed and your application has proven your identity on your behalf to the remote system, then the remote host grants you access.

For examples of using deprecated remote login commands, see “Using Kerberos Applications (Tasks)” in Oracle Solaris 11.1 Administration: Security Services.